Analysis

  • max time kernel
    95s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-09-2024 17:11

General

  • Target

    EvidenceBoardUIExtensionBridge.dll

  • Size

    59KB

  • MD5

    e2fbfbb5b1cd344c4d420071f092030a

  • SHA1

    ed54ae71ccd65d67325d9b385e387c3a0d82e7d4

  • SHA256

    cd118f1c07578012e2a59d6e1b6835706e5eb5adc67073a36b93ef9ee76a7a3c

  • SHA512

    f8b22c306580e0b0ada5daefa1014dc86e9f2878cf58db655fe21a5f258829bae5901b9f8ec9500148f811dbffe4ab8a5ec995633d2925a244b35079d69614c7

  • SSDEEP

    768:tWdDArgJLkbMyViFebTuAdO+uSJjpWSYil1AWXiMk/ObJTALOGSY2glyQzPTVRjE:tWdDArgJk42hAgMM3r/Y2kPTbDU

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\EvidenceBoardUIExtensionBridge.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4932
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\EvidenceBoardUIExtensionBridge.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1196

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1196-0-0x0000000000CC0000-0x0000000000CD0000-memory.dmp

    Filesize

    64KB

  • memory/1196-1-0x000000007449E000-0x000000007449F000-memory.dmp

    Filesize

    4KB

  • memory/1196-2-0x0000000004960000-0x0000000004974000-memory.dmp

    Filesize

    80KB

  • memory/1196-3-0x0000000074DF0000-0x0000000074E04000-memory.dmp

    Filesize

    80KB