Analysis

  • max time kernel
    9s
  • max time network
    15s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2024, 16:32

General

  • Target

    $TEMP/Dump.dll

  • Size

    172KB

  • MD5

    859737636bc7a4f0332a6cc6f0fee978

  • SHA1

    620e86d7e9b408733a65ed5b53b04af49c3d9d68

  • SHA256

    a01a479dbe7323b439b9cace4586f4caa60a367a264f6d298bde84c0654a6e9f

  • SHA512

    c4f5b08184fe3d6f233bad8fbf36403ecc75a80aa92fbf495c99ea7a1d0cd02a1c2f3e2affeafd148ae101c40a2eb1d3eab5a6beafc0c570b05da5fa6589abaf

  • SSDEEP

    3072:GsgbRiRlO4hFa804cZN0HaV3cjrfaeHVx00uzy5CUeU:Bgb4O4hF24cZiHAcjrfdGt0

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\$TEMP\Dump.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2524
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\$TEMP\Dump.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads