Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-09-2024 06:06

General

  • Target

    46ea49a50450ed749d8b12f1839bfd60N.dll

  • Size

    748KB

  • MD5

    46ea49a50450ed749d8b12f1839bfd60

  • SHA1

    e2c5e9609273e413ba639a6a644661fcc8bee744

  • SHA256

    4ff720081e48b0b82a9512703e1bb582890ef8039156dbb80b6bc32c84852a8e

  • SHA512

    453b120dd308cdf7dcc3ded70720acc5cb3172b3d463d661a809649c0d850adb0036400d01291a7ef7bc60bff7264e8927346798be7e0de52aed17a2f5c4d8a0

  • SSDEEP

    12288:mcQHQv+3pNi3g5zkKf+tqddsN9DYuFuTO6tdFRq6xGJOpqBTG0jdh3W/e+:JKQ2a3grfRjsN9DY/7tdy0Gkp+GaE7

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 32 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\46ea49a50450ed749d8b12f1839bfd60N.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:628
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\46ea49a50450ed749d8b12f1839bfd60N.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:3188

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3188-0-0x0000000010000000-0x0000000010124000-memory.dmp

    Filesize

    1.1MB

  • memory/3188-1-0x00000000027A0000-0x00000000027FA000-memory.dmp

    Filesize

    360KB

  • memory/3188-2-0x00000000029F0000-0x00000000029F1000-memory.dmp

    Filesize

    4KB

  • memory/3188-8-0x0000000003850000-0x0000000003851000-memory.dmp

    Filesize

    4KB

  • memory/3188-32-0x0000000003890000-0x0000000003891000-memory.dmp

    Filesize

    4KB

  • memory/3188-31-0x0000000003890000-0x0000000003891000-memory.dmp

    Filesize

    4KB

  • memory/3188-30-0x0000000003890000-0x0000000003891000-memory.dmp

    Filesize

    4KB

  • memory/3188-29-0x0000000003890000-0x0000000003891000-memory.dmp

    Filesize

    4KB

  • memory/3188-28-0x0000000003890000-0x0000000003891000-memory.dmp

    Filesize

    4KB

  • memory/3188-27-0x0000000003890000-0x0000000003891000-memory.dmp

    Filesize

    4KB

  • memory/3188-26-0x0000000003890000-0x0000000003891000-memory.dmp

    Filesize

    4KB

  • memory/3188-25-0x0000000003890000-0x0000000003891000-memory.dmp

    Filesize

    4KB

  • memory/3188-24-0x0000000003890000-0x0000000003891000-memory.dmp

    Filesize

    4KB

  • memory/3188-23-0x0000000003890000-0x0000000003891000-memory.dmp

    Filesize

    4KB

  • memory/3188-22-0x0000000003890000-0x0000000003891000-memory.dmp

    Filesize

    4KB

  • memory/3188-21-0x0000000003890000-0x0000000003891000-memory.dmp

    Filesize

    4KB

  • memory/3188-20-0x0000000003890000-0x0000000003891000-memory.dmp

    Filesize

    4KB

  • memory/3188-19-0x0000000003890000-0x0000000003891000-memory.dmp

    Filesize

    4KB

  • memory/3188-18-0x0000000003840000-0x0000000003845000-memory.dmp

    Filesize

    20KB

  • memory/3188-17-0x0000000003840000-0x0000000003841000-memory.dmp

    Filesize

    4KB

  • memory/3188-16-0x0000000003850000-0x0000000003851000-memory.dmp

    Filesize

    4KB

  • memory/3188-15-0x0000000003850000-0x0000000003851000-memory.dmp

    Filesize

    4KB

  • memory/3188-14-0x0000000003850000-0x0000000003851000-memory.dmp

    Filesize

    4KB

  • memory/3188-13-0x0000000003850000-0x0000000003851000-memory.dmp

    Filesize

    4KB

  • memory/3188-12-0x0000000003850000-0x0000000003851000-memory.dmp

    Filesize

    4KB

  • memory/3188-11-0x0000000003850000-0x0000000003851000-memory.dmp

    Filesize

    4KB

  • memory/3188-10-0x0000000003850000-0x0000000003851000-memory.dmp

    Filesize

    4KB

  • memory/3188-9-0x0000000003850000-0x0000000003851000-memory.dmp

    Filesize

    4KB

  • memory/3188-7-0x00000000029D0000-0x00000000029D1000-memory.dmp

    Filesize

    4KB

  • memory/3188-6-0x0000000002A10000-0x0000000002A11000-memory.dmp

    Filesize

    4KB

  • memory/3188-5-0x0000000002A50000-0x0000000002A51000-memory.dmp

    Filesize

    4KB

  • memory/3188-4-0x0000000002A30000-0x0000000002A31000-memory.dmp

    Filesize

    4KB

  • memory/3188-3-0x0000000002A40000-0x0000000002A41000-memory.dmp

    Filesize

    4KB

  • memory/3188-34-0x0000000002780000-0x0000000002781000-memory.dmp

    Filesize

    4KB

  • memory/3188-38-0x0000000003870000-0x0000000003871000-memory.dmp

    Filesize

    4KB

  • memory/3188-37-0x0000000003880000-0x0000000003881000-memory.dmp

    Filesize

    4KB

  • memory/3188-35-0x0000000002790000-0x0000000002791000-memory.dmp

    Filesize

    4KB

  • memory/3188-36-0x0000000003860000-0x0000000003861000-memory.dmp

    Filesize

    4KB

  • memory/3188-33-0x0000000003850000-0x0000000003851000-memory.dmp

    Filesize

    4KB