Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-10-2024 18:30

General

  • Target

    UMPTOOL V4.02_060725/Message.dll

  • Size

    2.6MB

  • MD5

    8e94611ea8b234c310d59ae76b39c25b

  • SHA1

    85af5a0e327f16b9c67d565ac324c49e3ca23400

  • SHA256

    b610e454c5637828e0f46e41ea7771ef2f242ffca89f44589d8857be7bb5eb61

  • SHA512

    3a2240fdb35e865e108650d3b8fbc9c14b8291710cef3963d8f1fbdabf65596bc893def8e2bb348359eb718ff97107d241f3723d8cba944c7ff099566376974e

  • SSDEEP

    49152:7x8UZsKA4FzRP2F9MakE7pN9so+/qpVrM6GD8Uoa:qosKZ/DEb9s3r8Uo

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe "C:\Users\Admin\AppData\Local\Temp\UMPTOOL V4.02_060725\Message.dll",#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:580
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\Temp\UMPTOOL V4.02_060725\Message.dll",#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2128

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2128-0-0x0000000002120000-0x00000000023F9000-memory.dmp

    Filesize

    2.8MB