Analysis

  • max time kernel
    136s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-08-2024 12:39

General

  • Target

    Nativeobjsvc.dll

  • Size

    148KB

  • MD5

    1a0318710a0f8cb9db4b1b3d75cac0cc

  • SHA1

    cc94379a2f3e03e188e31696ff50ec0c043b7488

  • SHA256

    2532baed38224d31f1448646ea6e70b531379dda6527b14c9b234c28ffd11042

  • SHA512

    c027a92b3c9e80b2ffb017f4b1555cb054f00cee40b8039fb72ac15e777d2b94ff3601659c625c7c2b2a8584a989a4878db338dac6afbf906f7fac633f12b0d6

  • SSDEEP

    3072:IL88tsy38hV9lpyn+oM87qq+gBX1ywpaeuxy0W1/gyM8Kd:oRtgfknC8O2BX1Paej5/gJd

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\Nativeobjsvc.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4276
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\Nativeobjsvc.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads