Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/08/2024, 19:54

General

  • Target

    c7d339f3c833e813e18e17da0ec9edc65bad36590d298c62c15dbb77a03496bd.dll

  • Size

    72KB

  • MD5

    87e4791f871be729f3481a6d8a513729

  • SHA1

    8816968d901051410d87fcc5caae1bc2f9eaacd2

  • SHA256

    c7d339f3c833e813e18e17da0ec9edc65bad36590d298c62c15dbb77a03496bd

  • SHA512

    f6977610f2ee4e8be6c0a718c7f395a428859a804be3ef2b22e164f2feee8b621a2bb441c628fba4104e47a911453e7cffdad4cd88b2c6b5d449e6a1811e7baa

  • SSDEEP

    768:Ncei3LYqQSdniKN6Y3HDjZIlOQ7YVJUYQRomGor87RdGJnTNmBy:M3LYUnF6CasQ8JUYQRomRmjG5TNu

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c7d339f3c833e813e18e17da0ec9edc65bad36590d298c62c15dbb77a03496bd.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3592
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\c7d339f3c833e813e18e17da0ec9edc65bad36590d298c62c15dbb77a03496bd.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      PID:1932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1932-0-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB