Analysis

  • max time kernel
    113s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 04:32

General

  • Target

    9098855ca0d77df3c3e25fd33b2b6485eb5190b1085362d3c8672ceb5c88405fN.dll

  • Size

    123KB

  • MD5

    e3fc7bcdd947284e4f02fef1a63fbd40

  • SHA1

    ac4acdb94df44511dd117a1a0f41ee46ba943538

  • SHA256

    9098855ca0d77df3c3e25fd33b2b6485eb5190b1085362d3c8672ceb5c88405f

  • SHA512

    956dff3e0103e94a4723a9208f62f9b8ccf348a8c4f23752e12a2807ded989df912befaa0057dac7dbe627eb7f24bc1c50cda846b903996daf6eba1837042c94

  • SSDEEP

    3072:6yvbX3RPbvMTxoFpHWa9M9MJEVTpSRYeolGA:62XpvMGF5T9M93TylIG

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\9098855ca0d77df3c3e25fd33b2b6485eb5190b1085362d3c8672ceb5c88405fN.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2724
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\9098855ca0d77df3c3e25fd33b2b6485eb5190b1085362d3c8672ceb5c88405fN.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads