Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/09/2024, 03:35

General

  • Target

    f22eaf0d535b632320d822f055c40ea5353e5ccc9b29ba6e54faae0581aec8c9.dll

  • Size

    6KB

  • MD5

    3efee65287141f2d1265ae97b2c8f832

  • SHA1

    8e31cae8a84d2aeff2396e240b9327fb978518da

  • SHA256

    f22eaf0d535b632320d822f055c40ea5353e5ccc9b29ba6e54faae0581aec8c9

  • SHA512

    0ea948b7d89301b13b2f04143e30e581d170709843d621de17456060e3c010a7e3b883c96dad89c86742635ab1ff451caef9c24a95054fd3b19e91764a153360

  • SSDEEP

    48:SfIBj0W6/aGxkaklS4rklStklSd8klSPklSTIZGifi5qwlGsPvwudSTgdV5l04bC:DixZjmjtjd8jPjcZGR5TIoST8JQr5U

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\f22eaf0d535b632320d822f055c40ea5353e5ccc9b29ba6e54faae0581aec8c9.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\f22eaf0d535b632320d822f055c40ea5353e5ccc9b29ba6e54faae0581aec8c9.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1696

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads