Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21/07/2024, 21:32 UTC

General

  • Target

    $PLUGINSDIR/blowfish.dll

  • Size

    60KB

  • MD5

    926e4475c00fb5254c32c876921b77d0

  • SHA1

    8a55bc8b6e49021a4abbd441783c41d5e019798b

  • SHA256

    d54c8582863c079996c4f1113b1c106204773ad9ea2ae831ba2b33b45bafdfa8

  • SHA512

    53f389e1a967c123ed591c7650cf6d3140abf1012dcac90faf2327e68558949eb2b19905098bd14ab3a9811d23f98466f88418d992ca6373f94afae56a285bd8

  • SSDEEP

    768:iqdVHQr1iIxqXiURXB+tzjjrrzhzlRryN+SaYhba3mrf+C7jWk1MLfoMR38:iawr1iIIXYplRrOk4f7HML1R3

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\blowfish.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2444
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\blowfish.dll,#1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2352
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2352 -s 220
        3⤵
        • Program crash
        PID:2168

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.