Analysis

  • max time kernel
    16s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    20-07-2024 22:52

General

  • Target

    604902af8b4268f975069df1b2c2d3e02a8f20b72992c87627ff594044f4036d.dll

  • Size

    659KB

  • MD5

    be7d0f0c186f2c7bf46bbbf59575e7ad

  • SHA1

    a11ebcf9beba3ec32749583c3d1500dfcf4880e7

  • SHA256

    604902af8b4268f975069df1b2c2d3e02a8f20b72992c87627ff594044f4036d

  • SHA512

    906fcb115d2d51c174223a1fede1b91856b2fddb62ff81c60a89d0c0203e5ab3721b989f4bb7a385910e4b057e7525ffc3b7b14101f067f736a5cbee1d185351

  • SSDEEP

    12288:p7tJrlrlWNc1J4eKtvD5N9nylBNHdvUNUsLM5sVgI2oqXU0VXLfCF9rP4NZO9OY+:hBlBBdvxsLM5saoqe9rPYZHT/EJ2/HK4

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\604902af8b4268f975069df1b2c2d3e02a8f20b72992c87627ff594044f4036d.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2536
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\604902af8b4268f975069df1b2c2d3e02a8f20b72992c87627ff594044f4036d.dll,#1
      2⤵
        PID:2352

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads