Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2024, 06:37

General

  • Target

    $PLUGINSDIR/SkinnedControls.dll

  • Size

    68KB

  • MD5

    c3e5d1a39e1f4dc8317a9e71ce93d141

  • SHA1

    7f1e4bcfb2a6b58b5e337d58713eb27dfb2afef4

  • SHA256

    512d67d40f6c73a8c7ce63060962b7632c47b528f340f152fbbda6ab12883579

  • SHA512

    32b5c5439a1d58f4fcc9348d0a91ed6c4ecf5bec3abc646a345a2256060a962978a7fc9a5ce155ad1498a1d6f77dac29d433e9398252bd66b1d89875447e4603

  • SSDEEP

    1536:pFkV9DWMRT1Cjz0rc2T7pWhpPZMcgnutbGFL3e4tTBMcMY8:peTDhRMz0rcJPCcRYu4tTB/V

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\SkinnedControls.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2348
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\SkinnedControls.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2356
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2356 -s 224
        3⤵
        • Program crash
        PID:2376

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads