Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    19/03/2025, 17:34

General

  • Target

    a996e4c18ae4c4563db0767cb230b24279daeb3f62ee62b061d2ee076d81bdfd.dll

  • Size

    116KB

  • MD5

    9c3f469a5b54fb2ec29ac7831780ed6d

  • SHA1

    9e380cc51e33a9f1e6c3835eb77a1bf7e804e07b

  • SHA256

    a996e4c18ae4c4563db0767cb230b24279daeb3f62ee62b061d2ee076d81bdfd

  • SHA512

    4d65c6df5be1c282f8fe1de8db3fed930e26fec3bc3ed838befd08c80465bfb548ff0b185dd0873a7461784e89587b04357caa9bc4a35a884366b48603c55b23

  • SSDEEP

    1536:01Pk0NR1wAJuATVg65YYloLx5c5xpp+awXmGVNuRcFnToIf3srTZuDP56W:YJuATOEYg5xP3wXmyN4ctTBfcrC56W

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\a996e4c18ae4c4563db0767cb230b24279daeb3f62ee62b061d2ee076d81bdfd.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1104
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\a996e4c18ae4c4563db0767cb230b24279daeb3f62ee62b061d2ee076d81bdfd.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads