Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-09-2024 23:30

General

  • Target

    8534b7af6f332dedf811eccdec3d649ce430fa6e1a540bddb609cd101f740d17.dll

  • Size

    7KB

  • MD5

    e782e58a6a0c1810fb3c05b7dc874c8a

  • SHA1

    ec7afa50b241c37e46dd58a19d99051b4fc44832

  • SHA256

    8534b7af6f332dedf811eccdec3d649ce430fa6e1a540bddb609cd101f740d17

  • SHA512

    e866f0f2923102e0de36ca82d9442d76aa82b1df5b0fda0965edbb8781a11fb64d3d90136ccde00bfeb476c7516c1db7a1194fa434a3286ce87e7c33367ff30c

  • SSDEEP

    48:66ay5YVO3EVkApc2wp8hH1NZn5EquglQ067YbPWObABbgL3q9J5S2hmc:b3EVkApcX4Hiv0hbP0q3qX5S2hV

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\8534b7af6f332dedf811eccdec3d649ce430fa6e1a540bddb609cd101f740d17.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\8534b7af6f332dedf811eccdec3d649ce430fa6e1a540bddb609cd101f740d17.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2320

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads