Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24-09-2024 02:36

General

  • Target

    57800373ef6281de3f09ea995703c2307c548717622244573a76e843a9c7b115.dll

  • Size

    133KB

  • MD5

    f946be853b2174b95b27788effbabefc

  • SHA1

    bb7b83482afb93ce683186d42f665f0c3e27de35

  • SHA256

    57800373ef6281de3f09ea995703c2307c548717622244573a76e843a9c7b115

  • SHA512

    6bb01a0ee788ae4573350b5db80cee321254427544cdd89fd2f6fea66e402e8ab12bbb6e5e6f5400c44a48790885f2eed0875bff2db6efedc9f767481b6774f5

  • SSDEEP

    3072:vvQzFb+gUTFYRK9idY3U6n/ki/iD0OZ/+psw/1:vvQJbzawK9iK3//kiqD0oGpsw/1

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\57800373ef6281de3f09ea995703c2307c548717622244573a76e843a9c7b115.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2600
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\57800373ef6281de3f09ea995703c2307c548717622244573a76e843a9c7b115.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.