Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 03:28

General

  • Target

    WebUI.dll

  • Size

    7.6MB

  • MD5

    a29a218642f0024d9061df45ea1bae07

  • SHA1

    3a97711c99dad00ae86be55edab74912f9be55ad

  • SHA256

    74dc92efc8279b770319549e818bbb5df711121e7eb9c7a0d54b4ff74d08d037

  • SHA512

    b55235ca3caf48a29a4cc1743bb8aa580ef8248b3999be29fc82097c22a68ced12f813bef6be46765651b478616da1d4704d36a4581a04b40cc048e220647390

  • SSDEEP

    196608:L39zxBBmYeZ12U8Blc/OwDlcXus9Y0SJsv6tWKFdu9CZ:Jzx6YeZ12TBlc/OwDlikJsv6tWKFdu9C

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\WebUI.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\WebUI.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2544

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads