Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23/05/2024, 21:38

General

  • Target

    8f8f591f76c7ac189ebfc3f1027ad3244e07cdae21ddfa68e55bfc7cc181aa59.dll

  • Size

    28KB

  • MD5

    6e633c709dafcc33bda506f2261a1210

  • SHA1

    29fcdb4dd0cc1f4d555e5d274c07edf9fc59ecc4

  • SHA256

    8f8f591f76c7ac189ebfc3f1027ad3244e07cdae21ddfa68e55bfc7cc181aa59

  • SHA512

    5ba30a1e158b7c2d2c15dc0331ce2a3f98acec809fb30f4b795aab1cdd11f2f7356b17d5e14be630ab2ca7a43957fdcf4255c89f2e6e937a92d23ecb27562bfe

  • SSDEEP

    192:P+ucpUJsRH8cCm7XjuaD29B5DrzH2HsxdBkCmxIj:PcCOR7Cm7XjuaD29fDrKOgC0Ij

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\8f8f591f76c7ac189ebfc3f1027ad3244e07cdae21ddfa68e55bfc7cc181aa59.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2100
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\8f8f591f76c7ac189ebfc3f1027ad3244e07cdae21ddfa68e55bfc7cc181aa59.dll,#1
      2⤵
        PID:1988

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\iloptcfg.cfg

            Filesize

            123B

            MD5

            1057ed2b67735220a19b23e23a5c91e3

            SHA1

            3c46f7cd0d19d87ddb30a865b3021167d2e1fafb

            SHA256

            0e1bd2306af7912af6006253ae239b2e784e532add5d1e9696506eb81466945b

            SHA512

            c6d416005d9284775c69f481852b00d0f1a2501a6b2c55e28ae7a52344cf4b0ddb4b4c03a9ffc46ad7153231214c6f99c06b8e8d4eec68ec8c9c41696f5d9397