Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-07-2024 10:16

General

  • Target

    $TEMP/AnaMetaphor.dll

  • Size

    19KB

  • MD5

    eca4d3581bfee01fbbdfab46e73b8afb

  • SHA1

    38b63ea322bd5f9b5ca14046a42f7ee25cf357d1

  • SHA256

    2d4b4f73706eb3753f57ecf1e83e4ae68b8c07c72fe64a2aa2b0d80e5f64b7b3

  • SHA512

    ef2f552f5216775aae85ac0835a7eb34498825e64961eb614a6728f76eaaef3e4ae36a847d0f7cfc30cce1b5c03e1521de93e1801db0a171dafbfbd73be66c20

  • SSDEEP

    384:SRhpw3Mv1HS3DDAdLuFio8g7d0ORZp/mC3OTKuW5ik:SRwcNyzEdLuQg7fRZp/mC3OTKuW5

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\$TEMP\AnaMetaphor.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4824
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\$TEMP\AnaMetaphor.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads