Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2024, 03:33

General

  • Target

    SnaperHelper.dll

  • Size

    53KB

  • MD5

    d7bbd27e484dc6aa6c7088196d257c6b

  • SHA1

    62f5ac2b8f8e8271292b9f16c87d754c74aa0e57

  • SHA256

    41910c02299bc47add3dfc67cd21ca6e4c90c887b1c6612f0831e256e22ccf89

  • SHA512

    ce3d650b6eb481f9d430432a3b6e1b3d11f1bead0f9c71920a8ffcd18086d22a22677d85765107d81d1a12cb9c62927b9f565d76f27077be532285427079e131

  • SSDEEP

    1536:Axsx9a3BHrEjurLU5n36+pWxNSgDBmOK0ar:Axsy3FAjoP+pPOK08

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\SnaperHelper.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2684
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\SnaperHelper.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads