Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    15-09-2024 08:40

General

  • Target

    Hpp Hook v6 NOSTEAM/hpp.dll

  • Size

    1.1MB

  • MD5

    7de6c028bd939619f8b714cb384fad4f

  • SHA1

    f56dcd352701eaf1e157d974c1bf3a593ea27fec

  • SHA256

    b86503eb3de92de1edbb9bdb4c3d31e9d2a114ce392a6961b8bc374b2824913f

  • SHA512

    56b553e3209bde43b26c8096c0982efac06937019fca7e5adf89d285bbc2ffb135e63c57715cd7dfb615736e998608c743f8f680e55cadf048a8e3f6ddee6962

  • SSDEEP

    24576:S0fzv8xtKlwjZbOngTo5IlfjTNLzsTGhvx3O9Ss68J:doxQuZ82BXsTA3O9Sv8J

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe "C:\Users\Admin\AppData\Local\Temp\Hpp Hook v6 NOSTEAM\hpp.dll",#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2640
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\Temp\Hpp Hook v6 NOSTEAM\hpp.dll",#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads