Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 16:07

General

  • Target

    $PLUGINSDIR/InstallOptions.dll

  • Size

    28KB

  • MD5

    b6dc3eca7cd55452c7d85d5dba9e5b54

  • SHA1

    21d2a3fb21e4057d0016688d177666c5c3e9e74b

  • SHA256

    4aab43ce0a225627e1990ab3b0601a359cc8fb4e760587d462f0f4de70a3ba10

  • SHA512

    b206c2ed34955cbd7e79d1a0d62f62630bd2f5aaa38538818137aaa09ae592f1d4d75e6c6b8cbec3c2736d3f97a5e2b925f97f2e21637406dc419889a4b00e89

  • SSDEEP

    384:Khd3M5Zc0zjJZfJUB6hH7PHgM8lYkvLziNe8Efux14J6aAI5dq26NwQdu:OMA0PPJUw7/ZUvSNeZmSIabqsb

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\InstallOptions.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2144
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\InstallOptions.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1292
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1292 -s 240
        3⤵
        • Program crash
        PID:764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1292-0-0x0000000074CD0000-0x0000000074CE3000-memory.dmp

    Filesize

    76KB