Analysis

  • max time kernel
    94s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2024, 02:27

General

  • Target

    783304ea3fd54f79aaf85f6b5596d90a6193437df88c1ddf1a04d8df0a5fd7b1N.dll

  • Size

    319KB

  • MD5

    3f00f5d183096888d2dd25aeac55ff60

  • SHA1

    50008d70d83f9e0d409af76f06a9a716cb550251

  • SHA256

    783304ea3fd54f79aaf85f6b5596d90a6193437df88c1ddf1a04d8df0a5fd7b1

  • SHA512

    8318d8842fa3200acc01b14156bba9477c790da6c0ad686a5c04dd8047dd5a9c38044d91d0c538479ed09da5f9df70f289721da82f9105a1010279a3880a72ff

  • SSDEEP

    6144:wT47tpm/WlOx/wjtNm4ged6YMRCwtNA2DQYNPOuo+JFaK/nP:wTq/m/WLq4ge6CtaGuo+JsK/P

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\783304ea3fd54f79aaf85f6b5596d90a6193437df88c1ddf1a04d8df0a5fd7b1N.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:208
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\783304ea3fd54f79aaf85f6b5596d90a6193437df88c1ddf1a04d8df0a5fd7b1N.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3592

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads