Analysis

  • max time kernel
    15s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22-02-2025 04:39

General

  • Target

    9837776c1bbee9ca02ab9b4dd760df88d26fd04a6afec9d8fd7e8d0573345f8a.dll

  • Size

    64KB

  • MD5

    626e0750cb2f17af5824e831fc2e5862

  • SHA1

    6586cf2a864d9a40c97a21a67eb153a849d27148

  • SHA256

    9837776c1bbee9ca02ab9b4dd760df88d26fd04a6afec9d8fd7e8d0573345f8a

  • SHA512

    c9e5827ef180f89dae3f6556861ce611d6208f3f52fc61f71c86e13ee97d328a421bc144d5ae1e66188564518a6ff129c084e610591f6e67de54551e7b1bde67

  • SSDEEP

    1536:mNEglT8gRA4APWfL8lgOii5i4zgi00nh8Y8j:OEYT8yjki14zj8fj

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\9837776c1bbee9ca02ab9b4dd760df88d26fd04a6afec9d8fd7e8d0573345f8a.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\9837776c1bbee9ca02ab9b4dd760df88d26fd04a6afec9d8fd7e8d0573345f8a.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2496

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads