Analysis

  • max time kernel
    13s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/09/2024, 18:13

General

  • Target

    $PLUGINSDIR/LangDLL.dll

  • Size

    4KB

  • MD5

    68a2bc20e9033d7d592c0e3db9b1c9a7

  • SHA1

    48f32201f29d897164f4328b3358cca659262597

  • SHA256

    7b5874ea96afe034b0d8a529ced3e97e12d712e9d1d2cb591b82bbce59105db3

  • SHA512

    52283afd58e88b43364c99652cb3d94e8f59dba223aa3c2f5a858e6baf108bfcf99283a7e1f09728bf293f255077620b9a025bbf3ac09d4b22c7b37ea023e648

  • SSDEEP

    48:aznkp3GVKW3DDX0ZaOKRBrPhQ3p9mljZPX57pe9nwrxoJvR0Jpdf+Jx:+C8KUDDX0YnrPmZ4jZ29n+xER0UJx

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\LangDLL.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\LangDLL.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:488
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 488 -s 228
        3⤵
        • Program crash
        PID:684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads