Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20-07-2024 04:16

General

  • Target

    4a4ed9de88f5d464a198fec520c550c0N.dll

  • Size

    8KB

  • MD5

    4a4ed9de88f5d464a198fec520c550c0

  • SHA1

    7c3563dec0e57afbce00fd55ca7319dffa6fb60d

  • SHA256

    2fca5698bfbdd7c1754533b88f3e4f0aece0b1740dbb4f066db5df32cbbdb442

  • SHA512

    f4c78e16cf38c4b413ab177a3ac71de6e544c91f4ab48c342dde1b1284f4a49532ce93d5440b0d16eae845e148ee658ac1030eb01e2ece3649a2a405a019304c

  • SSDEEP

    192:rh4SFyvWohE5xf6YUBSL63SUJqtMblWN:rO+ohE2B13NJqtM

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\4a4ed9de88f5d464a198fec520c550c0N.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2708
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\4a4ed9de88f5d464a198fec520c550c0N.dll,#1
      2⤵
      • Adds Run key to start application
      • Drops file in System32 directory
      PID:2852

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2852-0-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2852-1-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB