Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/09/2024, 01:30

General

  • Target

    ae14fd5f3f46c3127caf9c72619bfb956de857229942cc73f6187da7a5f64177.dll

  • Size

    2.3MB

  • MD5

    ea77f6f457bbc7efc293509681f74ce4

  • SHA1

    93f902763f5ca822ec2175cb5afffb26943b35c6

  • SHA256

    ae14fd5f3f46c3127caf9c72619bfb956de857229942cc73f6187da7a5f64177

  • SHA512

    7035ccfa4ec0dd8ca562684be2a01f3287f9bbb61140f69583d9f0f0b91f1670b00afc25715ab01c0f193586233b0c11c4231dde94ea773e8b69cc00713a0077

  • SSDEEP

    49152:uLHpq12eT7VLhYNqSTV6PwydPmgQrxv4d7Dgez:uLJqthYgSB6YydPmgc4dfge

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ae14fd5f3f46c3127caf9c72619bfb956de857229942cc73f6187da7a5f64177.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4732
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ae14fd5f3f46c3127caf9c72619bfb956de857229942cc73f6187da7a5f64177.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3468
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 740
        3⤵
        • Program crash
        PID:3508
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3468 -ip 3468
    1⤵
      PID:3848

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads