Analysis

  • max time kernel
    96s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/09/2024, 17:40

General

  • Target

    $TEMP/~nsis/Cloud-Web_nad_2_44.dll

  • Size

    495KB

  • MD5

    ac56735864a6cb5a5dec0788e28a4d78

  • SHA1

    fb2e5ab4f98dd8a5298d8b09f96fb70a1e767f20

  • SHA256

    52b805bfa64cec8dbd302587a14a00ec58165baf9526b13a2fb3c9124740f7a7

  • SHA512

    985d67f976ecb3bacfd19a9cb574a45f2f1d77ffaf8042fa8411fba63154de8d8290d697395c487af79c74807f88d91f8744f19e5edcc4c7df9a42b5216dd4e2

  • SSDEEP

    12288:PlNOEGjZ6hGUVMpaaU7M950Sb9n1ajoJc/bfYSci8mpMIjmwJY:qE0Z64A7M93nYcC/bfYSci8RIjmwJY

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\$TEMP\~nsis\Cloud-Web_nad_2_44.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\$TEMP\~nsis\Cloud-Web_nad_2_44.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads