Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    11/05/2024, 02:21

General

  • Target

    c7413d1bcc52bc6a24ad5dbc9f1d2f8e38f607dcf8a65fe8b887d37bc7c65acd.dll

  • Size

    8KB

  • MD5

    97927023f52032529243dfe856098f02

  • SHA1

    1c46856a17f437b9fef14ab2fac0baebafce79f2

  • SHA256

    c7413d1bcc52bc6a24ad5dbc9f1d2f8e38f607dcf8a65fe8b887d37bc7c65acd

  • SHA512

    0a257ae01e6d07a32737b1809b72f8ef3942e5dc9204986067f59963f99ae2620715cb978847251c3e5f7b585a7ea685efc4d1f12ffdd2f922037fa056b205cf

  • SSDEEP

    192:f0h4SFyvWohE5xf6YUBSL63SUJqtMblWN:8O+ohE2B13NJqtM

Score
9/10

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c7413d1bcc52bc6a24ad5dbc9f1d2f8e38f607dcf8a65fe8b887d37bc7c65acd.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1244
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\c7413d1bcc52bc6a24ad5dbc9f1d2f8e38f607dcf8a65fe8b887d37bc7c65acd.dll,#1
      2⤵
      • Adds Run key to start application
      • Drops file in System32 directory
      PID:2212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2212-2-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2212-3-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB