Resubmissions

28/08/2024, 05:45

240828-gfzwfsyfpl 10

11/03/2024, 16:38

240311-t5j8hsfe8v 10

11/03/2024, 16:32

240311-t11dyabd98 10

Analysis

  • max time kernel
    66s
  • max time network
    71s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    28/08/2024, 05:45

General

  • Target

    heur000.dll

  • Size

    124KB

  • MD5

    ca4822789da674e2ae4658ee4250adb5

  • SHA1

    58c3f3f15781cd775ce485f5c4d392b31bdbbe10

  • SHA256

    16e8d6dc3e1c3562f8f7e98d492c152965fc08d7cc57e3846e35de11af49092e

  • SHA512

    7022c63c100acc1cd2083f051ce37baa8a8e1dd1fad7c76e0ff90e05fc1c59356f9e2ae09402ca4f91bafece0c9ee52af804c52f05e6453d42bf3816542a61d7

  • SSDEEP

    3072:prQm5MC1bRoAwOSxoPMVsf0nQla8vxgs2N+r3rk:Km53RRgPvSCsDr3r

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\heur000.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4536
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\heur000.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:1944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1944-0-0x0000000010000000-0x0000000010028000-memory.dmp

    Filesize

    160KB

  • memory/1944-1-0x0000000002CC0000-0x0000000002CEC000-memory.dmp

    Filesize

    176KB

  • memory/1944-2-0x0000000002E60000-0x0000000002E61000-memory.dmp

    Filesize

    4KB

  • memory/1944-7-0x00000000013B0000-0x00000000013B1000-memory.dmp

    Filesize

    4KB

  • memory/1944-6-0x0000000002E10000-0x0000000002E11000-memory.dmp

    Filesize

    4KB

  • memory/1944-5-0x0000000002E20000-0x0000000002E21000-memory.dmp

    Filesize

    4KB

  • memory/1944-4-0x0000000002E30000-0x0000000002E31000-memory.dmp

    Filesize

    4KB

  • memory/1944-3-0x0000000001390000-0x0000000001391000-memory.dmp

    Filesize

    4KB

  • memory/1944-9-0x0000000002E40000-0x0000000002E41000-memory.dmp

    Filesize

    4KB

  • memory/1944-8-0x0000000002E00000-0x0000000002E01000-memory.dmp

    Filesize

    4KB

  • memory/1944-10-0x00000000013A0000-0x00000000013A1000-memory.dmp

    Filesize

    4KB

  • memory/1944-12-0x0000000002E90000-0x0000000002E91000-memory.dmp

    Filesize

    4KB

  • memory/1944-11-0x0000000002E70000-0x0000000002E71000-memory.dmp

    Filesize

    4KB

  • memory/1944-16-0x0000000002EE0000-0x0000000002EE1000-memory.dmp

    Filesize

    4KB

  • memory/1944-17-0x0000000002ED0000-0x0000000002ED1000-memory.dmp

    Filesize

    4KB

  • memory/1944-20-0x0000000002CC0000-0x0000000002CEC000-memory.dmp

    Filesize

    176KB

  • memory/1944-19-0x0000000002FD0000-0x0000000002FD1000-memory.dmp

    Filesize

    4KB

  • memory/1944-14-0x0000000002EC0000-0x0000000002EC1000-memory.dmp

    Filesize

    4KB

  • memory/1944-18-0x0000000002FE0000-0x0000000002FE1000-memory.dmp

    Filesize

    4KB

  • memory/1944-15-0x0000000002EB0000-0x0000000002EB1000-memory.dmp

    Filesize

    4KB

  • memory/1944-13-0x0000000010000000-0x0000000010028000-memory.dmp

    Filesize

    160KB