Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    17/04/2024, 21:08

General

  • Target

    128e43f9b8f502849d5646f54ee7f681ce3c922e743395fa0c9f0873807caf46.dll

  • Size

    397KB

  • MD5

    580da92dfb9fc57847a38f003aa71484

  • SHA1

    e48a5604d20b912dab2023953414c0a2ec765770

  • SHA256

    128e43f9b8f502849d5646f54ee7f681ce3c922e743395fa0c9f0873807caf46

  • SHA512

    c85062c41b33ac70c756f0f1a135ab91b344a6798aba0fcb537184236a69a36448da81a304aed03197817c20a5b47fc35f584abb99e044786caf926ad96e54d7

  • SSDEEP

    6144:151sacsiu2LDeIHoMDIbGFtcEOkCybEaQRXr9HNdvOac:174g2LDeiPDImOkx2LIac

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\128e43f9b8f502849d5646f54ee7f681ce3c922e743395fa0c9f0873807caf46.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2944
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\128e43f9b8f502849d5646f54ee7f681ce3c922e743395fa0c9f0873807caf46.dll,#1
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2928

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads