Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    12-06-2024 05:21

General

  • Target

    24cf3dcab4663ccb5c5027b6a951d85fea32d4caf474c6e3cee5a532ea86c73b.dll

  • Size

    2.1MB

  • MD5

    68cec114ec18f8be239dae08061f6cd6

  • SHA1

    6a56765e0c0edf8e49e6b0c1c04d0e2e0eeac8a9

  • SHA256

    24cf3dcab4663ccb5c5027b6a951d85fea32d4caf474c6e3cee5a532ea86c73b

  • SHA512

    85f5315fe70e74f1baf368c939bd95605539ccb7b37ccd429a682563b8a48b1ec5ba7cb157f83885e277becb66f54c62cc03017a97a68c27d4141988ea8fd1de

  • SSDEEP

    24576:udx9+LM+QxJJVNhxO+2rXHFdP4mVRka4J92gsd2lkqGGwMPKpKpXDnrpBr0qJesD:qpbHVNhxO1FDRshsd/kPKpKNnrb0C/b3

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\24cf3dcab4663ccb5c5027b6a951d85fea32d4caf474c6e3cee5a532ea86c73b.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1528
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\24cf3dcab4663ccb5c5027b6a951d85fea32d4caf474c6e3cee5a532ea86c73b.dll,#1
      2⤵
        PID:1912

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads