Analysis

  • max time kernel
    143s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/08/2024, 16:07

General

  • Target

    $PLUGINSDIR/InstallOptions.dll

  • Size

    28KB

  • MD5

    b6dc3eca7cd55452c7d85d5dba9e5b54

  • SHA1

    21d2a3fb21e4057d0016688d177666c5c3e9e74b

  • SHA256

    4aab43ce0a225627e1990ab3b0601a359cc8fb4e760587d462f0f4de70a3ba10

  • SHA512

    b206c2ed34955cbd7e79d1a0d62f62630bd2f5aaa38538818137aaa09ae592f1d4d75e6c6b8cbec3c2736d3f97a5e2b925f97f2e21637406dc419889a4b00e89

  • SSDEEP

    384:Khd3M5Zc0zjJZfJUB6hH7PHgM8lYkvLziNe8Efux14J6aAI5dq26NwQdu:OMA0PPJUw7/ZUvSNeZmSIabqsb

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\InstallOptions.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1428
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\InstallOptions.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1764
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1764 -s 636
        3⤵
        • Program crash
        PID:3744
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1764 -ip 1764
    1⤵
      PID:3948

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1764-0-0x0000000075210000-0x0000000075223000-memory.dmp

      Filesize

      76KB