Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-09-2024 17:49

General

  • Target

    215fd7c74e8254a551656af2c641d170N.dll

  • Size

    31KB

  • MD5

    215fd7c74e8254a551656af2c641d170

  • SHA1

    acdb8cc89d25ab659df7c34819adc791001f55a9

  • SHA256

    a6cbe1cf26c9c43c41f2822d618bab00ee9ac18df127d9c53ec302bc379cb723

  • SHA512

    1aac26e80d2753346286319ed796b51158ecbe2bb66e6ec7abc045c2579d4a2241a0de1d7e34463efb55328de76596a3a2185139428ca3f13aa40588ddd93839

  • SSDEEP

    384:X+k0j/0nj+2RirPJYAPKt1AKzhzJFfxSYKfbL72HlPxko2xz7fO2/fcp1HPR/3rk:X+/jMSE2YOXEP2zTXcp5PRvr9cqSpJd

Score
3/10

Malware Config

Signatures

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\215fd7c74e8254a551656af2c641d170N.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\215fd7c74e8254a551656af2c641d170N.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1332
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1332 -s 624
        3⤵
        • Program crash
        PID:3604
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1332 -s 624
        3⤵
        • Program crash
        PID:516
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1332 -ip 1332
    1⤵
      PID:668
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1332 -ip 1332
      1⤵
        PID:1096

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1332-0-0x0000000000400000-0x000000000040D000-memory.dmp

        Filesize

        52KB