Resubmissions

19/11/2024, 19:00

241119-xn2m1szfpa 4

19/11/2024, 18:48

241119-xfzhpa1bnp 4

Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 18:48

General

  • Target

    $PLUGINSDIR/MachineCode.dll

  • Size

    346KB

  • MD5

    fa6cb8106df9eb8f21d68e459bc97754

  • SHA1

    85b9c4f75f9a31d3d78f610c8e427729bdc37ffe

  • SHA256

    db99dbc5f4d23d6ce8fc298c14247d437584709316370cb0a02d45699a6e018a

  • SHA512

    aef8589e0b1c7e96b8c107193cdf27cb1cb522f22a155e63d56c9311196d26eb065b541045ede6df1ce27a0d4b2f815782a4e9a10819db017d718152c4f2a3de

  • SSDEEP

    6144:M48L4/dXZ6yHiwCgKjaH0/LAo3jslcVx6cvY0obyDUrreN90UZbr8zUqz:M4Z/dcyHi8tH0jd4K6SYA/8zUqz

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\MachineCode.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2544
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\MachineCode.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads