Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 02:15 UTC

General

  • Target

    SsmpVlogLayerComm.dll

  • Size

    297KB

  • MD5

    65781c88a134b182735c7503b8c09593

  • SHA1

    6bcb205e0606091aefe520f5ecba0a1f983921cd

  • SHA256

    9309741ced8d628c48892294d7b77b726413fb3ad383cf0538c265659dbfec1d

  • SHA512

    8f16a7baf7da962ce99ab5d07536e0fe33f9da59f04fa43e390095078f40ead69dac5905e93dea7aa30d0c8ffbd258d0d7f26eeb679f4b06a4a2b1090a048db4

  • SSDEEP

    6144:R9SqiyJ2WQBM8AGuGGJmrW6nmbS+wN4f8rbv65p4SQlNvw/5cdn74CY8:3riFWCM8AGGJmrW6mbS+wN4f4JSmN/mW

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\SsmpVlogLayerComm.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\SsmpVlogLayerComm.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2168

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2168-0-0x0000000000210000-0x0000000000251000-memory.dmp

    Filesize

    260KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.