Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2024, 03:19

General

  • Target

    190950642cde880d565b3a60cebc4613a3cb11085643d857ded4935bf828ea0e.dll

  • Size

    6KB

  • MD5

    79a6c271d1f0660cbe9af93598db8493

  • SHA1

    de1dac491965a5d2657ad4f5de74524a4cd0cee0

  • SHA256

    190950642cde880d565b3a60cebc4613a3cb11085643d857ded4935bf828ea0e

  • SHA512

    cc948a713a38713713c78b9936ca929f1d5994a633e55d77f19b29727814da3dd4f54d51b3e9d4cca69778cc35f572dfad0684a8a6747d5c6432d4a5bd884139

  • SSDEEP

    96:hy859x0P8MaKA3JLLggEbl/8jR0jAqdOMdND84K4q:F5oLpA3JLkgEJ/8jR6AqYMdJlq

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\190950642cde880d565b3a60cebc4613a3cb11085643d857ded4935bf828ea0e.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\190950642cde880d565b3a60cebc4613a3cb11085643d857ded4935bf828ea0e.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2124

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads