Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    03-06-2024 23:23

General

  • Target

    7cb7c906edb8283d7abd270131b8a59c26555d3321681b45728853d8aca61493.dll

  • Size

    81KB

  • MD5

    e56b0188ab133650fcaa38f5b9c1e3b6

  • SHA1

    b3cb69e3d44f79d746206974192b09763ba86915

  • SHA256

    7cb7c906edb8283d7abd270131b8a59c26555d3321681b45728853d8aca61493

  • SHA512

    43ee75ad4b5bd12ea46e4e15b76b84542af8ea929d51c530ff10318a77d035a400f79aab052796cb6a6c081f3df3569650151d1c7df8b223fa8fb59146783cc8

  • SSDEEP

    1536:ftByXv7uWGEqXZKXTadSp7Lxw9zzBPw+iASUSFOj8sWHcdF7zenq8W/:f4v4JKXTx71w0ArSsXF3enq8W/

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\7cb7c906edb8283d7abd270131b8a59c26555d3321681b45728853d8aca61493.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\7cb7c906edb8283d7abd270131b8a59c26555d3321681b45728853d8aca61493.dll,#1
      2⤵
        PID:1636

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads