Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/08/2024, 03:19

General

  • Target

    $PLUGINSDIR/StartMenu.dll

  • Size

    7KB

  • MD5

    9cead166a7e6b41e0d9f1d81dac6c5fb

  • SHA1

    0ea553bb919c135ac9167bce5cef97da6787ad63

  • SHA256

    39de086aafa16c8f24c72fa14c3635260a1080bad2a4ef39591721cc7112b307

  • SHA512

    f882f796579121f576e67adf4104151a680ca87becca360e914d8ff6abdc5250c933dce4ae56b029b2642b5571819c4500407c0c3df6cff92b184d2c7bcff156

  • SSDEEP

    96:YRJxbgt7V4Cc7Dm9JvAB3odlZQ6WhiQ8tcG4Z71h:YRrbgncG99Y3icGCB

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\StartMenu.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4600
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\StartMenu.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2692
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 616
        3⤵
        • Program crash
        PID:3736
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2692 -ip 2692
    1⤵
      PID:872

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads