Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    21/04/2024, 02:32

General

  • Target

    c4106b0810ffa1ad4bc79a2fae6c1910a8add0492ae2a7d7be7ef3a99e1cca42.dll

  • Size

    81KB

  • MD5

    3149c347f6183dd1c9ec0ba585112f97

  • SHA1

    93d3b291487aa29798cbf24096e5d9055587c446

  • SHA256

    c4106b0810ffa1ad4bc79a2fae6c1910a8add0492ae2a7d7be7ef3a99e1cca42

  • SHA512

    daff776422ae7fe00a94ac1a34b64edeee97e6d2a263644cb5a5fbb4ba3cb9deabbb2f40b6f03b37a7aa02883bcedcb3c5e1749e4d4188c6421b9eaa7ea2025d

  • SSDEEP

    1536:/ByXv7uWGEqXZKXTadSp7Lxw9zzBPw+NASUSFOj8sWHcdF6+eXq8WE:uv4JKXTx71wnArSsXFpeXq8WE

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c4106b0810ffa1ad4bc79a2fae6c1910a8add0492ae2a7d7be7ef3a99e1cca42.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\c4106b0810ffa1ad4bc79a2fae6c1910a8add0492ae2a7d7be7ef3a99e1cca42.dll,#1
      2⤵
        PID:2612

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads