Analysis

  • max time kernel
    121s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-10-2024 07:01

General

  • Target

    русский экстримальный сервер/plugins/antiattack.dll

  • Size

    114KB

  • MD5

    16c561a7546b4dcb181e16f81504a28c

  • SHA1

    89d89244762bf7edfc97cb0b9442ac723bda609f

  • SHA256

    58d5ced6031c703390e3964b8a7d1b4290926987c20ef15d40779b290dc9d83c

  • SHA512

    a5fe577475c74af1e2fb497e1d0b1df9c22cfc55b788056dd93097949b93f51578575f165aa763b83faeb0fa05455d33be43f11ad9cc566c6a643728e6a964d6

  • SSDEEP

    1536:G08xF1YJMspdH71KBWMJilKMAv4HtFKA2s0Vl9hgYLxbHSnYM5/6xu4E:G08HadHkWiilwnAHyFbHoV6xu4E

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe "C:\Users\Admin\AppData\Local\Temp\русский экстримальный сервер\plugins\antiattack.dll",#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2892
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\Temp\русский экстримальный сервер\plugins\antiattack.dll",#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2672
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 220
        3⤵
        • Program crash
        PID:2064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads