Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02-09-2024 05:55

General

  • Target

    8737631f44d6ed2fbe554c2d4e243cffe82beda218acf4d00e0863c19d79cce9.dll

  • Size

    1.1MB

  • MD5

    16769924b2b8403bce849e2e4407f7ab

  • SHA1

    9c281ec63598e36e697479e789f3fcee396d24c8

  • SHA256

    8737631f44d6ed2fbe554c2d4e243cffe82beda218acf4d00e0863c19d79cce9

  • SHA512

    97bc54f3ce16f2abee75e5e3d938630cdd1229127e8385bec4eac4c641c59bc1aaf3a9fc90e730223cba98a7210dffcd6d870d1857a8a7070083c119ed11e57a

  • SSDEEP

    12288:jxOkywPx9xADWfhjcz3eq/KDQH/NDpkO8Ii1cZ5Z6oNSdBN/i5zzaK6qaGXn3Hgp:jMv09iCRtq/KDQH/0dIiaZ5ZRcln

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\8737631f44d6ed2fbe554c2d4e243cffe82beda218acf4d00e0863c19d79cce9.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2736
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\8737631f44d6ed2fbe554c2d4e243cffe82beda218acf4d00e0863c19d79cce9.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads