Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-10-2024 10:14

General

  • Target

    Minimize_MKZSCC.dll

  • Size

    24KB

  • MD5

    f2208de9008e76ba4114e899db911473

  • SHA1

    8d7fe169addf82adae641f19c88901222d47f8ba

  • SHA256

    8fa6da375307a8a981180840162d7751aea89b2046e77a3c1cc8a7bda8f25087

  • SHA512

    031c884f5678472fbae1e7f3727e7b107454368f6022510c9acd5cec1ef9a59544d2a97c79928465fe23c062dddf90bf12140f3e3b2f005edd8597a9cc5df533

  • SSDEEP

    384:3jCuiZYZubPxQVnbJ/nQB2nr4L/V+QXahs6XAaZp8D3wB:3nreuj/QBur4LdaXAG

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\Minimize_MKZSCC.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4416
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\Minimize_MKZSCC.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2280

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2280-0-0x000000006F4C0000-0x000000006F4C8000-memory.dmp

    Filesize

    32KB