Resubmissions

07-08-2024 19:26

240807-x5kqtssfjl 10

07-08-2024 19:23

240807-x32xbswcnh 8

07-08-2024 19:20

240807-x2kawswcle 8

Analysis

  • max time kernel
    134s
  • max time network
    138s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    07-08-2024 19:26

General

  • Target

    loaderV6/acwow64.dll

  • Size

    37KB

  • MD5

    94e972f7e5f6662dece2c435047d9fa0

  • SHA1

    4f782489bd2cf9f3cf97a17dd2ab158d75022599

  • SHA256

    99c6d28b981552f92341da34deee0a4e0212bfb76f0d5b29711331ad47b9ed25

  • SHA512

    7c4dc945c9c69681cd72329696c9837d60c413bcc0b35429ebc3868bdb30b814e80ce36682cb97aca21130cfd963600631da59acbd3fe3de4fa1f735e16047c2

  • SSDEEP

    768:+6cW1qHGnnU5yadOKjGfDVoHOqAQG2gcwO6:+6c6q2nedO2GfZoHOqm2gcwO6

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\loaderV6\acwow64.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3080
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\loaderV6\acwow64.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:64
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 64 -s 616
        3⤵
        • Program crash
        PID:4788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads