Analysis

  • max time kernel
    93s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/09/2024, 00:15

General

  • Target

    $_39_/riched20.dll

  • Size

    411KB

  • MD5

    c87ebe4e54a41907e12fb561c5229d78

  • SHA1

    c20cb94e4638ab5a26d7876b7c4c3809af7e0792

  • SHA256

    fa14736d21ae9dbcfa75f9b5b2f76c757712aaea5b4d13943e7268f7dc678375

  • SHA512

    12d83b7a4267efa052458fbe04fb9467de6b99ba0bdf3ad4580e94dba39e40633ca452605e38d1c6bc683e54f0a0d3d66f704e9ebc8664ae57e0020fad8655aa

  • SSDEEP

    12288:s+MX88dRuV8iIYoQ38BTe3P2Obur51ORd6c9MElP6In2:DMX88dRagg2OburXoYpQ/n2

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\$_39_\riched20.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1136
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\$_39_\riched20.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4520

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads