Resubmissions

15-09-2024 13:37

240915-qwsazswapd 6

15-09-2024 13:33

240915-qt2fwavhrh 6

Analysis

  • max time kernel
    101s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-09-2024 13:37

General

  • Target

    $TEMP/downloader_easeus/2.0.0/2trial/aliyun/api-ms-win-core-processthreads-l1-1-1.dll

  • Size

    18KB

  • MD5

    e7e679dfd5704fb3bbae35b1675f66d9

  • SHA1

    2c0cc9796dd06a69b6c0e0dc4a75a93aeb294b92

  • SHA256

    057b0483fee48563e78ff5a4ce27db03b65189d8a9cb16b4e0d9ccdeab769c81

  • SHA512

    5393964b1dd842fe6be7346a57ecea8cd7460f5fa4596137b1a2b6ddf71ddcff5e6584f3199d0aad3b3c3c234d4cdb7a4c63a2e7954fd30b7b02f415edd64855

  • SSDEEP

    384:RvDfIeBW5hWP3rq0GftpBjK43FZgljZkIN/:ueMQiE4VNS

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\$TEMP\downloader_easeus\2.0.0\2trial\aliyun\api-ms-win-core-processthreads-l1-1-1.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4060
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\$TEMP\downloader_easeus\2.0.0\2trial\aliyun\api-ms-win-core-processthreads-l1-1-1.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads