Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    11-07-2024 06:14

General

  • Target

    $PLUGINSDIR/sqlwrap.dll

  • Size

    20KB

  • MD5

    56bb18722f8e42a53d7d4ea6a09e520a

  • SHA1

    7ccc0fa410cafec0a790e0c611087e1f61e8d7eb

  • SHA256

    35fd84a44cbbeda4ee7a7e40554c656a21506346862aa7af99ce74930522b20c

  • SHA512

    cee572a6ce1d1551da3e4efe7c5fa7a76ad4eeaccc583d856a350f24d2a3f9e8dc39fe885ce9aa9a696a24dda960ed920fdfbd97d7a3e7d327c1b0fb34ce691c

  • SSDEEP

    96:2zCgCtUTDB8h8+rTjT90eB/DlAvSioMRwLCVD4B9:QCgft07ivOLCVDW9

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\sqlwrap.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2732
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\sqlwrap.dll,#1
      2⤵
        PID:2812

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads