Analysis

  • max time kernel
    96s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/09/2024, 06:57

General

  • Target

    4df0776d0b3bbe01b4e7ccd35991890b3f5e96c15045a78680513c680e497d56.dll

  • Size

    1.1MB

  • MD5

    d93f8bb679c24a2350e0c01623a4cbd3

  • SHA1

    22d7369090e0aff637b18f06daf4ab8b683ecb0b

  • SHA256

    4df0776d0b3bbe01b4e7ccd35991890b3f5e96c15045a78680513c680e497d56

  • SHA512

    11fc36154ca1ad2f8a7d1dd0d11413abc8f5fe5c18f828a0b86b0eb700dc784823dfdd76ae73522aa422f82871bc10fee8910f98d64c6e82fa0c8fbd7715fd41

  • SSDEEP

    12288:n2/hBfXxxbUlItPJDAum0cpoY2OaZhqse+R509a+Jp9m1m3DvfhnvJBHUF2:n2jxxbBtPJO0Uh2109a+b8Y3lYF

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\4df0776d0b3bbe01b4e7ccd35991890b3f5e96c15045a78680513c680e497d56.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3452
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\4df0776d0b3bbe01b4e7ccd35991890b3f5e96c15045a78680513c680e497d56.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1592

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1592-2-0x00000000748D0000-0x0000000074B43000-memory.dmp

    Filesize

    2.4MB

  • memory/1592-5-0x0000000074A87000-0x0000000074B43000-memory.dmp

    Filesize

    752KB

  • memory/1592-4-0x00000000748D0000-0x0000000074B43000-memory.dmp

    Filesize

    2.4MB

  • memory/1592-6-0x00000000027D0000-0x0000000002889000-memory.dmp

    Filesize

    740KB

  • memory/1592-1-0x00000000748D0000-0x0000000074B43000-memory.dmp

    Filesize

    2.4MB

  • memory/1592-12-0x000000006E690000-0x000000006E6A0000-memory.dmp

    Filesize

    64KB

  • memory/1592-13-0x000000006E690000-0x000000006E6A0000-memory.dmp

    Filesize

    64KB

  • memory/1592-0-0x00000000748D0000-0x0000000074B43000-memory.dmp

    Filesize

    2.4MB

  • memory/1592-14-0x00000000748D0000-0x0000000074B43000-memory.dmp

    Filesize

    2.4MB

  • memory/1592-15-0x00000000748D0000-0x0000000074B43000-memory.dmp

    Filesize

    2.4MB