Analysis

  • max time kernel
    10s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    14-08-2024 16:49

General

  • Target

    bin/imudp.dll

  • Size

    74KB

  • MD5

    1ce7753e24128a57d092947732b5a5ca

  • SHA1

    2b2b6b27e0ce040aca234a688044bba088484518

  • SHA256

    5e356ee306e90046ec23a59a8b057e4c71276e79c549af813dcea6091261dd27

  • SHA512

    2b614da68fdc29cbb2df9049b9077b037765201fcde69ba823076431094e677523d4581c1ddb43f5068ec4d7444747c4f4ff08456b8c6d50552e4b6db17e12e3

  • SSDEEP

    1536:0RP/6n+0gLDZkNSpocfeXz2CX++UtRaTNd:EP/6n+0qDZkNSpoJ1UtRaTNd

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\bin\imudp.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\bin\imudp.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2456
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 232
        3⤵
        • Program crash
        PID:1660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads