Analysis

  • max time kernel
    2s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    19/11/2024, 15:16

General

  • Target

    user32SteamFamilies.dll

  • Size

    425KB

  • MD5

    4e677c27fee53437252a3b63f9447924

  • SHA1

    8007216f7ce33fd9f0273d232d75fc0d8271c1ea

  • SHA256

    a649252a304b5cdf9d4d9e222a8220bab7c8478a8e7949044d03e0904298ed36

  • SHA512

    d2b29372d5a6d82c27035beb5ecfcf75fab3b449b04ed13703424f2c7f834424941914e6014b77cf498626c850f08dfd53672ee035ca01bcb07bf6c97bbd0e95

  • SSDEEP

    6144:OtvGAzkd7Rr4lfWR2UyeQGpmeXflTbxNbKV5GVUuhEl4ILprMzHYs2D/dvtnA5lm:8A3jrQuILxns2D/XDVtyfu

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\user32SteamFamilies.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4304
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\user32SteamFamilies.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2140

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads