Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/03/2025, 17:30 UTC

General

  • Target

    f2a386775e57d68fd5a86b3dae43bac8c064a6957d2de9a8f27fd655045538d5.dll

  • Size

    204KB

  • MD5

    3c583e01eddd0ea6fe59a89aea4503b4

  • SHA1

    6b8060a638b5c530a7d50f7e1b4d6592042c71a9

  • SHA256

    f2a386775e57d68fd5a86b3dae43bac8c064a6957d2de9a8f27fd655045538d5

  • SHA512

    34291a5276e3e12ee01745908629ce17a1c177b2a3ccfad534bb9f72829bf1344d0f2c372f52d96dabc5b7deb6ee2f4beaf9b483312d86ea7eeefe138f8ed018

  • SSDEEP

    6144:oT/bmrgblGEf87QDx5vRBr6Yy9e7Nk0sNFarCONtTBV8XiDY:on8OyWNk0sTarlNtTS7

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\f2a386775e57d68fd5a86b3dae43bac8c064a6957d2de9a8f27fd655045538d5.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2916
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\f2a386775e57d68fd5a86b3dae43bac8c064a6957d2de9a8f27fd655045538d5.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2256

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.