Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    02/12/2024, 16:10

General

  • Target

    tmpfile-main/ZeroHack.dll

  • Size

    1.1MB

  • MD5

    1871dae37e3c93cc4adff71d99081139

  • SHA1

    4e37bc7b4ba825676a05d0a58757b07448e0a4dc

  • SHA256

    b5e269b60c138f5668eeb6f6eb24f195bbd32ea753b66657594755c359318099

  • SHA512

    ada8dd72a6643955b5ae5a72f0174ea6eefac2ccbd8282f1808d9efc8fb2e0b648f6322cd35e1fac44bebddaf1221139ee4d5e2769900fc22a261772ea63b937

  • SSDEEP

    24576:+oqduRagFgyx/XWN8dISc5bNvchYeNQdEfSj+vKTm5FaEugpDe/7xz46k847j3RI:+LvgFgyVWN8dISc9NvCYeNQdbKvKTm5S

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\tmpfile-main\ZeroHack.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4696
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\tmpfile-main\ZeroHack.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads