Analysis

  • max time kernel
    118s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    20-04-2024 15:14

General

  • Target

    ea37f1ad9ce97c4ee27d0ec8b70c85e2d558e399452e175c81ad23102efa103a.dll

  • Size

    51KB

  • MD5

    53a4e622b1a3e7b80f0aa8f1fb0abdc4

  • SHA1

    bddb3d0e5ed5f06ac1e4cfa5e368413fda25467c

  • SHA256

    ea37f1ad9ce97c4ee27d0ec8b70c85e2d558e399452e175c81ad23102efa103a

  • SHA512

    04cf6764077573a3afa3061f2ad629d59beec853f16c2e5166dd959cfddd94f1513c33065dff6eb422afea2c419bb13995278537b6bb1bd0154fa518048e1269

  • SSDEEP

    768:3Er7XR1M6t6FikUE58ozVOB+6QcXn0cE5Y18BtrEZJjuSkwFOBezVsAMC6Hh4:3EXXM2HEhzVWKtrEZFxFOBGpMC6H

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ea37f1ad9ce97c4ee27d0ec8b70c85e2d558e399452e175c81ad23102efa103a.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ea37f1ad9ce97c4ee27d0ec8b70c85e2d558e399452e175c81ad23102efa103a.dll,#1
      2⤵
      • Suspicious behavior: RenamesItself
      PID:1992

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads