Analysis

  • max time kernel
    1s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    23-10-2024 14:28

General

  • Target

    ForlornInject.dll

  • Size

    6.3MB

  • MD5

    0b6f9ce7b90e1486a35c41f4e70fab35

  • SHA1

    6a6d7c8bc0cd3d14f723971565f473dd29142d00

  • SHA256

    1e51e4be4862f978cb93c33bc066d6043b926e5e142db85ab0b4a0591d3ce4ef

  • SHA512

    07bbcb43e8b4a64a74f3ef9b64d738a9f9efed65fb52d2eaa90adce9917ad79531ddb2c9d6f715095c7697c7ab9d05df1a60861b89b6c8ed9f9079f4e0b739a2

  • SSDEEP

    196608:RHhh1rc05EktXeINkb0s9jVsANC2BVKBsBdqu:RJAJktXTu0iPtAgdf

Score
7/10

Malware Config

Signatures

  • VMProtect packed file 1 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ForlornInject.dll,#1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:796

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/796-2-0x00007FFF03980000-0x00007FFF03982000-memory.dmp

    Filesize

    8KB

  • memory/796-1-0x00007FFF03970000-0x00007FFF03972000-memory.dmp

    Filesize

    8KB

  • memory/796-0-0x00007FFEE2809000-0x00007FFEE2AC3000-memory.dmp

    Filesize

    2.7MB

  • memory/796-3-0x00007FFF02B50000-0x00007FFF02B52000-memory.dmp

    Filesize

    8KB

  • memory/796-4-0x00007FFF02B60000-0x00007FFF02B62000-memory.dmp

    Filesize

    8KB

  • memory/796-5-0x00007FFF01600000-0x00007FFF01602000-memory.dmp

    Filesize

    8KB

  • memory/796-6-0x00007FFF01610000-0x00007FFF01612000-memory.dmp

    Filesize

    8KB

  • memory/796-8-0x00007FFEE2220000-0x00007FFEE3117000-memory.dmp

    Filesize

    15.0MB

  • memory/796-11-0x00007FFEE2809000-0x00007FFEE2AC3000-memory.dmp

    Filesize

    2.7MB