Analysis

  • max time kernel
    136s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/10/2024, 10:05

General

  • Target

    iext.dll

  • Size

    216KB

  • MD5

    f91cfe6df71fbbbe56ddf70247ab9b49

  • SHA1

    6d6e25569bca49c19f2a4b07675194a1bf055eb4

  • SHA256

    7169863abd2e9a59ae706235224222754c44eea12a4304f6ac426ac4a89688a9

  • SHA512

    841a0632b0bca43d590f72602a0161e04c77e1e881d5bd6d294edab4f9c5577bb8e46f15dd6a0c831e5774fa53e449397146d57b8575ea04506a64f3842490aa

  • SSDEEP

    3072:edh+tmslaQRiAvBvXo8M360VVQrtPdDMDyowHhcA6anR:9iGK8M36zVdcb

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\iext.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4860
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\iext.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads