Analysis

  • max time kernel
    134s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-07-2024 11:39

General

  • Target

    20a17e69c72601edc441b265f70bec3fc815eaba9a0e825b8d53f2a56ae16c92.dll

  • Size

    2.5MB

  • MD5

    6a23d890bb0be2f90140af407040fa12

  • SHA1

    1a9f2aa01c745125ddebed4bdfd8c37abfc4063a

  • SHA256

    20a17e69c72601edc441b265f70bec3fc815eaba9a0e825b8d53f2a56ae16c92

  • SHA512

    062fc7d21a4587faf132cb84e9c887033002a1736a8b4fa9a459e9fdbcc7cd76ad38868024f03c71781c830fc2ad1670274e2d3277c5cbf504ce97e20f4499c2

  • SSDEEP

    49152:/99L0pHi5HU26/xMDucf4fm5MqhpowDIm6rIZCNFFmX:/99YpHii2wuDuPfkOwtgNFE

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\20a17e69c72601edc441b265f70bec3fc815eaba9a0e825b8d53f2a56ae16c92.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1424
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\20a17e69c72601edc441b265f70bec3fc815eaba9a0e825b8d53f2a56ae16c92.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4792
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 828
        3⤵
        • Program crash
        PID:4140
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4792 -ip 4792
    1⤵
      PID:3384

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads