Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    27/02/2025, 02:39

General

  • Target

    Codecs/Haali/mkzlib.dll

  • Size

    78KB

  • MD5

    a09e606469d3976fc4be96736c7d2671

  • SHA1

    b85486b3a4ef6fe84fe5a7e16878ee09a04b066d

  • SHA256

    6d057b4fde46a5dd0550b73989011a050eb12868dda30787ad3673e569dc6d11

  • SHA512

    611e9ee2396bd3449d0bb143dd02a844935624a474c6ec50289b70b2f69d5e603d900fc4274d7439e92bc3453e1ff8f6464dd483d31c45d6944dc16e5cc5a4f4

  • SSDEEP

    1536:c+DFEuj1NkXaMyuWqezcTo8SRlGIIObnToIfFT+aG:VzgX0zcelGO7TBfFT+aG

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\Codecs\Haali\mkzlib.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2916
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\Codecs\Haali\mkzlib.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2972
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 224
        3⤵
        • Program crash
        PID:2912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads