Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    25-08-2024 17:01

General

  • Target

    $PLUGINSDIR/Guard.dll

  • Size

    42KB

  • MD5

    f0e0a2a6ad1cde7fb31f40633457637a

  • SHA1

    a268e83d43eff991e9bbb85f1d39d83bd2d317ce

  • SHA256

    5d7ace2e3f5a8afc362e7097252fdc574641137022911549c49053944c341308

  • SHA512

    38b9520eeea4771ae139585e4698ed0d27663d8b8e61a7e42be923b704e356b8a5ee50b81736d220ff79fbd02d59f5aac163a16750dc469245e53ba159e9fae1

  • SSDEEP

    768:68hm30mtAbija+YUsXpr67h0e6i4PgQNSCsYwJLmuWm655aBRqnU:6EszYZped9Z4YQNLsYwJLm7tU

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\Guard.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\Guard.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2328

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads