Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    19-11-2024 19:20

General

  • Target

    06abfbd278feaa3bb47fd0efb97956ea737d691f66595a56e9d80fa92f3cad45.dll

  • Size

    599KB

  • MD5

    357c4ff0144052f2ab0b3eca8055cc31

  • SHA1

    92ff338ee607699ebfb6c84ae0cf336bb8324410

  • SHA256

    06abfbd278feaa3bb47fd0efb97956ea737d691f66595a56e9d80fa92f3cad45

  • SHA512

    e4846033c664c54bc2a4fc7641625959ff6bdd9b19b6ad111231d7bc50e25f835bb5acc11af3e4d6a13348cd63016efffea5a89167bc6ccc2525f38545765973

  • SSDEEP

    12288:Cz+4JyGMalyMNk8thPB2EbEPA99drekfl/EUGygoOV+uyJdkIKqL1hMM5:CFJy0Tk6B2EbEo9/XflyXonu0KqL1hF

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\06abfbd278feaa3bb47fd0efb97956ea737d691f66595a56e9d80fa92f3cad45.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\06abfbd278feaa3bb47fd0efb97956ea737d691f66595a56e9d80fa92f3cad45.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2380

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2380-0-0x0000000076380000-0x0000000076441000-memory.dmp

    Filesize

    772KB