Analysis

  • max time kernel
    103s
  • max time network
    105s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250410-en
  • resource tags

    arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    18/04/2025, 04:43

General

  • Target

    kh.dll

  • Size

    4KB

  • MD5

    c0aec89e4dc32fb0455b5ba72ab60bcf

  • SHA1

    810895f5aec20559c76e1139d91f964235234539

  • SHA256

    ebac4c23d288b3714702b907be613c94a8611fcac6cec78c2b1bfc9833c3c051

  • SHA512

    cfd86c5561dbb695bdd934c39b298d12269a6571799dd8b2c1eb3ce8904c5c4afc0958a505882d2b38c7d973703042585fa8eb9ff928f143335d3f808aece4ab

  • SSDEEP

    48:CjknnZJH2mxnV2Vh2X7uVlAKfo+OAO05+AAY3tZJ4nix:OknDrv23e6AKfhO7k+AAmZJ4n

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\kh.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5840
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\kh.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2528

Network

MITRE ATT&CK Enterprise v16

Replay Monitor

Loading Replay Monitor...

Downloads