Analysis

  • max time kernel
    95s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/09/2024, 19:47

General

  • Target

    26b7a21d3416cd6ab731c1c8b3c64dc5eed1e2355d4138abf4d95814b36e791e.dll

  • Size

    7KB

  • MD5

    9f57589f407a7a1f44c41f8bffe34f89

  • SHA1

    3ab34faa4fb6a07d21c690254ee4f5a2e8171d50

  • SHA256

    26b7a21d3416cd6ab731c1c8b3c64dc5eed1e2355d4138abf4d95814b36e791e

  • SHA512

    8c42d85da407ffe4223ffeb20dffa17f17f69bf3ebf1202661c27bd5e62894a41d1e7610c00f484ef3cd2166cc44117975290199a3fa34bde43f4213870e94a3

  • SSDEEP

    96:wb4VHccYJUC/aFbz/j0OvaPsd3cX5aXW:wUaJf/aFbP0O72JaX

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\26b7a21d3416cd6ab731c1c8b3c64dc5eed1e2355d4138abf4d95814b36e791e.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:232
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\26b7a21d3416cd6ab731c1c8b3c64dc5eed1e2355d4138abf4d95814b36e791e.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2408

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads