Analysis

  • max time kernel
    37s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30/09/2024, 15:19

General

  • Target

    31e949b2c0516d1157b694f8fd1fc9e647f0cd762adf34a44b729f7355d10a98N.dll

  • Size

    4KB

  • MD5

    fc39b8e914044ceda491edbb75aba240

  • SHA1

    7db1c048d8311397bb251e5011e254ec0bd85194

  • SHA256

    31e949b2c0516d1157b694f8fd1fc9e647f0cd762adf34a44b729f7355d10a98

  • SHA512

    cf2bd846200ff5fa4cf0144ee60c4a7c902e34d4939e937792c92adf03df02b61b7b471d3c66aad1b8d2d2b5041adfb8d905c9e84dae3c381fee691fc9600a1e

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\31e949b2c0516d1157b694f8fd1fc9e647f0cd762adf34a44b729f7355d10a98N.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\31e949b2c0516d1157b694f8fd1fc9e647f0cd762adf34a44b729f7355d10a98N.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2080

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads