Analysis

  • max time kernel
    15s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02-08-2024 22:39

General

  • Target

    bin/udefrag-kernel.dll

  • Size

    46KB

  • MD5

    f72f526b334a578b8fbdc6a20b9e2e4e

  • SHA1

    e89977dbd6e3b21016764ea39e0bfd6c93a02f70

  • SHA256

    0233af69b35decefdc7bb9ab7c8732434ebd4880c3b18085e6116f28431e3d4b

  • SHA512

    ec25fa006943b411b20a2c9ca6824412a47615a62446d0aacf37fdbac48cf785f93008cae69697453efc94785ccdeef06c7292da625a88146369113d95bb3a0e

  • SSDEEP

    768:gcPFbqnYkp+98StOUEiD7oXGeB6SGyrPVj4ZtWWBMK6133I5OgKssFhXOjy20uCn:IVp++StsiQvvGy5jStQb1HXV00x7

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\bin\udefrag-kernel.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2908
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\bin\udefrag-kernel.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads