Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-10-2024 08:17

General

  • Target

    eb38c81aa9a09933dc3e47b446406aa594292bb253174f3487d9074ba47f1bceN.dll

  • Size

    6KB

  • MD5

    247aec515923ac5a98a44a55771fb630

  • SHA1

    51b4833724f1300c49e8c540aa649393ca022ecd

  • SHA256

    eb38c81aa9a09933dc3e47b446406aa594292bb253174f3487d9074ba47f1bce

  • SHA512

    48a96041a87e7b4584226067e0b877276f7bc8b945c3154ade2aba9b07399bc33d6608562622d0320e2c4714b088a1e73477dac6b0e92d1f2f0a8d9f15b1a7f5

  • SSDEEP

    96:DixZjmjtjd8jPjcZGR5TIwluCuPi9qzeLVihxAasXnCiK13Jef3AeGM4cZ0ZM:unSR6bgYJuCuP/zCUUyiq

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\eb38c81aa9a09933dc3e47b446406aa594292bb253174f3487d9074ba47f1bceN.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4876
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\eb38c81aa9a09933dc3e47b446406aa594292bb253174f3487d9074ba47f1bceN.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4492

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads