Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2024, 02:38

General

  • Target

    bf069379acb1a3ae17552017dd7217a073821efed363123753a8eb8b0f05a112.dll

  • Size

    5KB

  • MD5

    f28f63593e2a5781302565269c580b27

  • SHA1

    11ab0e784d31f339bce9f48e7855aca671681372

  • SHA256

    bf069379acb1a3ae17552017dd7217a073821efed363123753a8eb8b0f05a112

  • SHA512

    3866db8616be8f0ddcb8c0369c2082cdf55d54ffb5747dc36f377baa69d2d803cc169920cebf6b98b5e30cda31fec16649fd55ad59708af2df5b7144938f7c63

  • SSDEEP

    96:nEY2RrF1eqwi42DOmgzxaKIPzusBTauuU6msug7+:EHRh1epp4gl6ztTaubJsNy

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\bf069379acb1a3ae17552017dd7217a073821efed363123753a8eb8b0f05a112.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2796
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\bf069379acb1a3ae17552017dd7217a073821efed363123753a8eb8b0f05a112.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1780

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads