Analysis

  • max time kernel
    91s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-09-2024 16:03

General

  • Target

    msimg32.dll

  • Size

    6.3MB

  • MD5

    6c1d68c7960415c632429da5aa258062

  • SHA1

    c4de42e1b1de043c1a4224eacbd429d4fbef5764

  • SHA256

    5b9c3d8a7377aa103f13a12bbd81f9d833de987e1a39da3d1b30ef4a30437cfa

  • SHA512

    5d3b250636bc6ee96f4b3329a29d0d4b7cbebbcf7f7ed325725b2cbd9830d51f843b472b55f5c34845f90c69fe7f80e803e44b0142df443ab5c53b2af4805e86

  • SSDEEP

    98304:B6v4h6HjL23qzZ0+ca29gjYCUP5zCmstJXnYDw0uSTvYD:k4gL2dhEJXnYrTvi

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\msimg32.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4764
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\msimg32.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4896-1-0x000000001004E000-0x000000001006C000-memory.dmp

    Filesize

    120KB

  • memory/4896-2-0x000000001004E000-0x000000001006C000-memory.dmp

    Filesize

    120KB

  • memory/4896-0-0x0000000010000000-0x0000000010653000-memory.dmp

    Filesize

    6.3MB