Analysis

  • max time kernel
    121s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    31-10-2024 08:27

General

  • Target

    $PLUGINSDIR/ServiceBlock.dll

  • Size

    24KB

  • MD5

    8592853112ae45b942550ff1b3b3ccd7

  • SHA1

    62535e792ec4214cd23651116acbb61d5c0bf848

  • SHA256

    dc8696d38e17a131d4bbe66dc8b7e3a6ad164df67fe37ddcfab3a50ae5b60835

  • SHA512

    ce232f32a8f17b5b88fd0f794ee691dd0b70070a7b6c9d9eb823de6613ab5d39297293539c8cf75b3c8d20f62b8e689c28ab0fb8d5bfc46765e80b0bac58330e

  • SSDEEP

    96:8FfsDNGK1iz+O/lShRh9GxEI81Jud1OG3aRe/:ZDz1iSYcOGJEO+aRe

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\ServiceBlock.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\ServiceBlock.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2040
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2040 -s 236
        3⤵
        • Program crash
        PID:1736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads