Analysis

  • max time kernel
    97s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-09-2024 14:08

General

  • Target

    2ff76b6c24fbe558710ff3a3cae8df00N.dll

  • Size

    8KB

  • MD5

    2ff76b6c24fbe558710ff3a3cae8df00

  • SHA1

    5269e5e1bb67a4bd4a52911cc90b43fdad7122fb

  • SHA256

    eb8e5c81c24935db84914a20e00ed77ad812e285042667b84136112f6472de71

  • SHA512

    2f5b574cf795939511ae7315a63724763c72adc9b982df67aad45c26a1931d5250d671c5a1fcee644042366fe0e339f8515cd758b85be590f5e9da7792bcc828

  • SSDEEP

    192:9h4SFyvWohE5xf6YUBSL63SUJqtMblWN:9O+ohE2B13NJqtM

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\2ff76b6c24fbe558710ff3a3cae8df00N.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3412
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\2ff76b6c24fbe558710ff3a3cae8df00N.dll,#1
      2⤵
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      PID:516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/516-0-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB