Analysis

  • max time kernel
    77s
  • max time network
    80s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-08-2024 21:45

General

  • Target

    495cdf274c9be036824798d06f45f720N.dll

  • Size

    2.4MB

  • MD5

    495cdf274c9be036824798d06f45f720

  • SHA1

    0a1d8c44e6e58a551821ef0db295fe48098ce553

  • SHA256

    ed6a4a7f1c33d7e2a61f5a3122eabed8dda1b87ef57018910e93878ad6be57c9

  • SHA512

    2ed6e9b8516c0d4b431a008c567cca3778322905fe2c7bc6d86c549391d36e4ed2ae5d0705f0a727477e7ac238ae7ad55c2da8b331bb4b046bc651b03e33cddf

  • SSDEEP

    49152:B7uXgqXuBRoYdHs2VhX68/ToqupuK4jbhRnqCNyLmnQAZKN:RuX/unoYdJPK8/ToqSuK4OCe

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\495cdf274c9be036824798d06f45f720N.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4848
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\495cdf274c9be036824798d06f45f720N.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4464

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads