Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    03/07/2024, 11:37

General

  • Target

    aa3732cf0c08c287db49dae9cd11ac456d2a01db9de25e8e0e4f9c86196db4d8.dll

  • Size

    2.1MB

  • MD5

    332b66bf4c83f8d24703bf42820d914d

  • SHA1

    e830922fe67ce60a2f4d8bca7386ece86108acf3

  • SHA256

    aa3732cf0c08c287db49dae9cd11ac456d2a01db9de25e8e0e4f9c86196db4d8

  • SHA512

    20de03d55bf95fafbe8e7018f903fceeeba60ea7983db367138fbe3a5abf45fad8bcb897f92093307c8447a1f6fa67a88aad5a56aef683a0bc5b3c415faf44dd

  • SSDEEP

    49152:y8feI79oK2xUrHv31P0bhJ/P0BDpinATs75a78tL:y8D7WK2U/tLBDpgh08tL

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\aa3732cf0c08c287db49dae9cd11ac456d2a01db9de25e8e0e4f9c86196db4d8.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\aa3732cf0c08c287db49dae9cd11ac456d2a01db9de25e8e0e4f9c86196db4d8.dll,#1
      2⤵
        PID:1956

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads