Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04/06/2024, 01:57

General

  • Target

    b72e6dcb13b83e73ff7d2ddbe8a8c6a72519a0cfe2744c8eaad3a10e1bf0e8c1.dll

  • Size

    82KB

  • MD5

    c08f0466a6beef4dd1b65311a03c6879

  • SHA1

    e2728ea6fdbd34872eff61d0844e6734773e2cfe

  • SHA256

    b72e6dcb13b83e73ff7d2ddbe8a8c6a72519a0cfe2744c8eaad3a10e1bf0e8c1

  • SHA512

    ca4e3d9cc8cda3791c31b5cd1b9a885eedded06afb16b40184386b16fd2deea979ac2eaabebf8ce80aed0faa29f6ee05104e31e4725560f9760fc94f68a8ed57

  • SSDEEP

    1536:moXhEXC+6+ZRxZeeirlqQ0nca4wnZgaLktA+31+SY4sWlcdliSWk8/msahOj:mo+XVxYVJqQ0pZg6vFlrWksahOj

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\b72e6dcb13b83e73ff7d2ddbe8a8c6a72519a0cfe2744c8eaad3a10e1bf0e8c1.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2456
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\b72e6dcb13b83e73ff7d2ddbe8a8c6a72519a0cfe2744c8eaad3a10e1bf0e8c1.dll,#1
      2⤵
        PID:1624

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads