Analysis

  • max time kernel
    141s
  • max time network
    139s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-07-2024 00:21

General

  • Target

    Battlefield 2/NavMesh/gts.dll

  • Size

    340KB

  • MD5

    ac3676c0f0c72d02bd83aafc6c91dfa8

  • SHA1

    f675a86d6513180b4feceb0260f5e83c871060b1

  • SHA256

    6979e134dab0aeb08e674a6010c1d02886a7e3d5b125a3f7b44d7abc5d19386c

  • SHA512

    916f553b799262bb9992a23fe9fef9888ba8ba4c10e5eea638013ee685814c22bef9f13906fbce0ea3356a56962130dea08d7095850ab0f2ce42a7726801f43b

  • SSDEEP

    6144:TmZ4L3tmMaoJ4fw493+bRQKJa1rV+dhTfW6oKBktvNRXENZJV7foYDbaOq9zSt2Q:6Zkafw49EQKJaaYztvNRXENZJV7waaOX

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe "C:\Users\Admin\AppData\Local\Temp\Battlefield 2\NavMesh\gts.dll",#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4672
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\Temp\Battlefield 2\NavMesh\gts.dll",#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1368
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1368 -s 636
        3⤵
        • Program crash
        PID:432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1368-0-0x0000000000E70000-0x0000000000EED000-memory.dmp

    Filesize

    500KB

  • memory/1368-1-0x00000000005F0000-0x00000000005FB000-memory.dmp

    Filesize

    44KB

  • memory/1368-2-0x0000000000FB0000-0x000000000108A000-memory.dmp

    Filesize

    872KB

  • memory/1368-3-0x0000000000E70000-0x0000000000EED000-memory.dmp

    Filesize

    500KB