Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2024, 20:12

General

  • Target

    23c598638e9cd7dd88371e0d4dd54af850a49bc927358f025ad77a273824fc8c.dll

  • Size

    319KB

  • MD5

    26c9604944e633f1ad83e4538a705eed

  • SHA1

    376bbfee7a15485a9233c4f704fe421f0a9972eb

  • SHA256

    23c598638e9cd7dd88371e0d4dd54af850a49bc927358f025ad77a273824fc8c

  • SHA512

    bf4aa84066aae2a981578eecd2a092be1633c13fd768ef2d369f5027420d062c4ff1706b3b64908914c4efaaa1f9c5d2fae94ba1c197ca738ae26b28ce978b2c

  • SSDEEP

    6144:ztndDj9Oii1BeiJuEYxMielQty/NIf0hiX3wQw9L6wgFW8d:RpROiKcioMxlcKNc0cUFs

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\23c598638e9cd7dd88371e0d4dd54af850a49bc927358f025ad77a273824fc8c.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2680
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\23c598638e9cd7dd88371e0d4dd54af850a49bc927358f025ad77a273824fc8c.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2788

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads