Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-11-2024 10:48

General

  • Target

    $TEMP/$_53_/K8Skin.dll

  • Size

    376KB

  • MD5

    6f2e568ad29d065ecb9073e0e943158b

  • SHA1

    1d6f747b5abe0ba06eb70a4f93a2dfe046342094

  • SHA256

    2f2f55967767478491d982c07d7197db914a3cf22d57b9ded917c1e9173f8431

  • SHA512

    8cacbf539926f7a7f4be1963ef92fd83facbce7d68f1a2c9cc0554a86b2307486f00b3d678f417746db054654d0c9c1675a9d0633b01817153ca5168a0c7de47

  • SSDEEP

    6144:nImZpwTL5wSOo1tyWdMb23N/JWTPzLf/yOYRVvoB7sHHSwF8irmRtBQaFBbkYmU+:nImvwTL5wSOo1tyWdMb23N/JazLf/yZ1

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\$TEMP\$_53_\K8Skin.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\$TEMP\$_53_\K8Skin.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2292

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads