Analysis

  • max time kernel
    95s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/09/2024, 22:51

General

  • Target

    544330649660cc046634000306a487bb1285e95b004ccca9b93e9937bf3fb124N.dll

  • Size

    5KB

  • MD5

    f5c445366a7440d0768002cd7e611550

  • SHA1

    7af6dab8c965b0145094576644d191dd25dff67c

  • SHA256

    544330649660cc046634000306a487bb1285e95b004ccca9b93e9937bf3fb124

  • SHA512

    e961539c07142ae42f3569f2b2047b89cc48edfdf73e299c6917d3b3946faa1867a3a17a9cab201ce71e0bd7d15bfeaad2d3f28b1211b1276c4e0575d433af4e

  • SSDEEP

    48:q0aaPO8jGSLIv+Tqq7NqrhWR07iIsitl6YtDytJFgOrnsB/SsyomXrxZg15tGE/:1h9jTqMMrY0OI/KYyznSM1Zg1bGE/

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\544330649660cc046634000306a487bb1285e95b004ccca9b93e9937bf3fb124N.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2216
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\544330649660cc046634000306a487bb1285e95b004ccca9b93e9937bf3fb124N.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads