Analysis

  • max time kernel
    118s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04/05/2024, 15:14

General

  • Target

    MobileIdentifyDLL.dll

  • Size

    214KB

  • MD5

    465664b55d5baa1c122baf9c28cf122b

  • SHA1

    dce92025d008c171e1d1e0dab2c1fc088b6fc872

  • SHA256

    ce591290ad1b3b55b485d60e893a44feae4cf72590680a60921b71f323cbdfe9

  • SHA512

    43c229bf77ab5309b6401d98f74af4a444b1c159a524cca13a79618b143c29d00789e9ec092a827ff2bd88b40d48158fc3681bb3580c2e7d0d53710b94b202fb

  • SSDEEP

    6144:8x3fJhBlCpNRWOuxOhcXAUMBOC45tLXJ0JW0CaoaUq1uL5kjxcE0pm:8x3fJhBlCpNRWOuxOh/UBtN0H1uL5QQm

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\MobileIdentifyDLL.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2320
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\MobileIdentifyDLL.dll,#1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2016
      • C:\Users\Admin\AppData\Local\Temp\kadb.exe
        adb fork-server server
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1212

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads