Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2024, 20:18 UTC

General

  • Target

    bin/Updatemode.dll

  • Size

    36KB

  • MD5

    316e8ba769e6774a0e17078586ad3077

  • SHA1

    02ba8c4676621cdbd31e35ef3c51b3cbdc6c7653

  • SHA256

    f5462eb7d7f2758bfa55ebba8f2bf3fa01194f03a16c0e9dd5a84ed33116e746

  • SHA512

    cbff041d038ed14c83038a4a7ff9ef013d0822ed0d2666e6928d9957ee211ee358219a4f556643f8278b7b3ecef22ef68afc76d78e0e1926913a9143a66f62dc

  • SSDEEP

    768:T6QjSSzMfy/cJjcIgMEPQ50U3kNGq2zy:WsS9fkM4IgMao0GkB2zy

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\bin\Updatemode.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2600
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\bin\Updatemode.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.