Analysis

  • max time kernel
    96s
  • max time network
    154s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    02-12-2024 15:52

General

  • Target

    libbirdfont.dll

  • Size

    3.5MB

  • MD5

    e96c933e57c28a008b29bc73d43ed30a

  • SHA1

    a3533360aef123d6d3a0beeab1328880cf2079bd

  • SHA256

    5a551a29c199c474eb67722cb21d13adfc71f0e51b2dd90df57046ae9e60dc64

  • SHA512

    c17ac32cd4c6aa5a2eb687dc6b5f4471d088cd305f5e0b890cb226417b6a72dfd3690c1759e499b8587ce06025cec576b1562044d2f3e78773490d7267d4ed39

  • SSDEEP

    98304:fo/50HiH1UWofMTmpWyXR6Jj7P3mi2NxZmA8lS:g/XmpWygP3mi2Nx8A8lS

Score
1/10

Malware Config

Signatures

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\libbirdfont.dll,#1
    1⤵
      PID:4740

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4740-13-0x0000000062E80000-0x0000000062E9D000-memory.dmp

      Filesize

      116KB

    • memory/4740-17-0x000000006DD00000-0x000000006DD0F000-memory.dmp

      Filesize

      60KB

    • memory/4740-25-0x0000000068F40000-0x0000000068F6D000-memory.dmp

      Filesize

      180KB

    • memory/4740-26-0x000000006FC40000-0x000000006FDA1000-memory.dmp

      Filesize

      1.4MB

    • memory/4740-24-0x0000000066000000-0x0000000066109000-memory.dmp

      Filesize

      1.0MB

    • memory/4740-23-0x0000000070540000-0x000000007057F000-memory.dmp

      Filesize

      252KB

    • memory/4740-22-0x0000000064940000-0x0000000064955000-memory.dmp

      Filesize

      84KB

    • memory/4740-21-0x0000000069140000-0x000000006918B000-memory.dmp

      Filesize

      300KB

    • memory/4740-20-0x0000000065300000-0x00000000653AD000-memory.dmp

      Filesize

      692KB

    • memory/4740-19-0x000000006B740000-0x000000006B750000-memory.dmp

      Filesize

      64KB

    • memory/4740-18-0x0000000064F80000-0x0000000064FD3000-memory.dmp

      Filesize

      332KB

    • memory/4740-16-0x0000000061440000-0x000000006145C000-memory.dmp

      Filesize

      112KB

    • memory/4740-15-0x0000000061600000-0x000000006166A000-memory.dmp

      Filesize

      424KB

    • memory/4740-14-0x0000000068B40000-0x0000000068B80000-memory.dmp

      Filesize

      256KB

    • memory/4740-12-0x00007FFEC4FD0000-0x00007FFEC4FE9000-memory.dmp

      Filesize

      100KB

    • memory/4740-11-0x00000000626C0000-0x00000000626DA000-memory.dmp

      Filesize

      104KB

    • memory/4740-10-0x00007FFEBF1C0000-0x00007FFEBF21D000-memory.dmp

      Filesize

      372KB

    • memory/4740-9-0x000000006EE80000-0x000000006EE97000-memory.dmp

      Filesize

      92KB

    • memory/4740-8-0x0000000066380000-0x0000000066474000-memory.dmp

      Filesize

      976KB

    • memory/4740-7-0x00007FFEBF420000-0x00007FFEBF448000-memory.dmp

      Filesize

      160KB

    • memory/4740-5-0x00007FFEBE700000-0x00007FFEBE84E000-memory.dmp

      Filesize

      1.3MB

    • memory/4740-3-0x000000006C1C0000-0x000000006C27A000-memory.dmp

      Filesize

      744KB

    • memory/4740-4-0x0000000063A40000-0x0000000063A92000-memory.dmp

      Filesize

      328KB

    • memory/4740-2-0x0000000068DC0000-0x0000000068EB1000-memory.dmp

      Filesize

      964KB

    • memory/4740-6-0x000000006D580000-0x000000006D6DC000-memory.dmp

      Filesize

      1.4MB

    • memory/4740-1-0x00000000693C0000-0x0000000069465000-memory.dmp

      Filesize

      660KB

    • memory/4740-0-0x00007FFEAF370000-0x00007FFEAF706000-memory.dmp

      Filesize

      3.6MB