Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-10-2024 01:42

General

  • Target

    821680553f1800637d6b2eedf7d8e31bdaafde5bb0cd4efc5b60ab88935a9945N.dll

  • Size

    23KB

  • MD5

    a45591ad2e46169cf2dcee33009870b0

  • SHA1

    7afd3bc32672ec3264ab2bbbc26fc6fe63d8c587

  • SHA256

    821680553f1800637d6b2eedf7d8e31bdaafde5bb0cd4efc5b60ab88935a9945

  • SHA512

    da537f331114456d88d5364f5411b8f8bc844eea3267ceac6b3b7820f1e6baf7ed2af090adb87eec14b0b9f0080912982d21d310ce67e5f9b1653f8510757b31

  • SSDEEP

    384:Vk/FUuVL14wI9kO9NEA/6Q59mH4fGpr0HczMRI1s7/nYPLFzBX2VDFANkCbl:Veh4wCk2eA/6kC9Vi3RI1s7/YzBGVp+f

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\821680553f1800637d6b2eedf7d8e31bdaafde5bb0cd4efc5b60ab88935a9945N.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1716
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\821680553f1800637d6b2eedf7d8e31bdaafde5bb0cd4efc5b60ab88935a9945N.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads