Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17/04/2024, 22:48

General

  • Target

    a4202d41462b62845bf46be663c3e0face7406c0800007524532c34f4f73ac6e.dll

  • Size

    51KB

  • MD5

    81108f6aa0fab518e0caabe0ab86b1f2

  • SHA1

    8cf309a8a1f97a5216545dbe4a0a52a861493b1b

  • SHA256

    a4202d41462b62845bf46be663c3e0face7406c0800007524532c34f4f73ac6e

  • SHA512

    287a09fed8af2c2bb0d016c40ff417bfeb3567b64d45bfc119a997eb2949648ac4291b93acec8d0fc6aca8e0590fe3e38740b501f02d5c4c1ffe18a286f7312c

  • SSDEEP

    1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLKJYH5:1dWubF3n9S91BF3fbo2JYH5

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\a4202d41462b62845bf46be663c3e0face7406c0800007524532c34f4f73ac6e.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2904
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\a4202d41462b62845bf46be663c3e0face7406c0800007524532c34f4f73ac6e.dll,#1
      2⤵
      • Suspicious behavior: RenamesItself
      PID:2100

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads