Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    17-10-2024 21:02

General

  • Target

    Win32/mimilib.dll

  • Size

    40KB

  • MD5

    97d95fa767c62e3dd17fb883b6a1d5dc

  • SHA1

    c271396203b94c99f6578fc42179716fbcf54bbd

  • SHA256

    0f60f322e16e2deb759f729232b0578a640af23b9327a4327d45b8ceb85022e8

  • SHA512

    1007160b0c917e3a2af27c2da428605a4edb572674e602c7d11aeddabfaf91e33d05903750c4b6313b94acd749b2776b759d3f83b5288391e939ad6647784a73

  • SSDEEP

    768:IhUZHYTw3R3Zeu1b5Oib7Zs3sd9hmVejnl0SNhFnGEhMFnesEhi:/nikb55b7S8dfIejnlD3GE8xEY

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\Win32\mimilib.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\Win32\mimilib.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2096
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2096 -s 220
        3⤵
        • Program crash
        PID:2084

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads