Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13-03-2024 06:09

General

  • Target

    7f621e081ec1ab49aa36ae52a3d07dd64f9733e12b18cea642b8c8c1dc836d7d.dll

  • Size

    179KB

  • MD5

    24f78385aa884d28c9fcca053b52dd75

  • SHA1

    8d90f2a2462a062a14a37f529babda46d28242a6

  • SHA256

    7f621e081ec1ab49aa36ae52a3d07dd64f9733e12b18cea642b8c8c1dc836d7d

  • SHA512

    14fc3d6f3776b47034a18b676630cddb15aa347e4783cae5d22c2e03c57502a0ed7e46e5999e3b36ae5c35a9cb068378286c91873522a7285786f4c4112e3597

  • SSDEEP

    3072:nKmXTCIx9en0h7k4yTUp9OimOKWaRTYUIMOmVF2lQBV+UdE+rECWp7hKN:VuIL5WoxmOKR09MOaBV+UdvrEFp7hKN

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\7f621e081ec1ab49aa36ae52a3d07dd64f9733e12b18cea642b8c8c1dc836d7d.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2488
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\7f621e081ec1ab49aa36ae52a3d07dd64f9733e12b18cea642b8c8c1dc836d7d.dll,#1
      2⤵
        PID:3056

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads