Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 13:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Skeet.dll
Resource
win7-20240903-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
Skeet.dll
Resource
win10v2004-20240802-en
3 signatures
150 seconds
General
-
Target
Skeet.dll
-
Size
8.8MB
-
MD5
3674e921fa0e8272b6d18280cd20011d
-
SHA1
7a02625d9306ad47fe1470019dd2b2428c73147c
-
SHA256
f5a598cd7450806f2aa2f0101b5d8801955aa5a5fb9d48e0717bdfdbc80fb4a4
-
SHA512
d4141159a4d4e51452f5d34a89ebfc6e6ef6c6aa18c4e5b560f06baf6dfd793d04c7f739e3433542d67391e29ca814353a0da4312ef04410c92cef5d56e0afd9
-
SSDEEP
196608:gQHLQrE8f8tNSPFOGJFACQM6rwQafIrBYcFYp:jHB7SP+frG+
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2284 2136 rundll32.exe 28 PID 2136 wrote to memory of 2284 2136 rundll32.exe 28 PID 2136 wrote to memory of 2284 2136 rundll32.exe 28 PID 2136 wrote to memory of 2284 2136 rundll32.exe 28 PID 2136 wrote to memory of 2284 2136 rundll32.exe 28 PID 2136 wrote to memory of 2284 2136 rundll32.exe 28 PID 2136 wrote to memory of 2284 2136 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Skeet.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Skeet.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2284
-