Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23/07/2024, 15:25

General

  • Target

    $PLUGINSDIR/KillProcDLL.dll

  • Size

    20KB

  • MD5

    acc5bb97897cbc7d49d89d6ed5ba79bc

  • SHA1

    9ec453aa48a25851a65900aab09a534a67875491

  • SHA256

    6d43d9d45c52273ea9b3dd16af030a6221df78fcf0f07238f6aa92b4cda660a4

  • SHA512

    c38a5bdf14d1bc1e1214ef0b2693a919629350cd0b159486f180307013df83c22e95c8209dcecede07afb47422ccca72efa7c6ed53642017eabe6bcb341d1a06

  • SSDEEP

    96:aUGda5TnpKPmDq+Fmq1wu++wto/kQAQyU7YCHb+4SqTh:xGdappPmtqCDtob/64pTh

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\KillProcDLL.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2744
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\KillProcDLL.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2700
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 224
        3⤵
        • Program crash
        PID:2656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads