Analysis

  • max time kernel
    96s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-10-2024 01:14

General

  • Target

    4126660fd9526673567ffc1b966d5e9d831c42432a14617db44186ba02f5af63.dll

  • Size

    751KB

  • MD5

    ac2ba9072087f933b3bcafe67ee7cf0c

  • SHA1

    adffb056a5d84807829a9c16b0a95f4f9ec5d420

  • SHA256

    4126660fd9526673567ffc1b966d5e9d831c42432a14617db44186ba02f5af63

  • SHA512

    c6988b03822b6c5dab1421adfe4de5cae31ed47e84108689c20e86c3462d0d22504fb3b00b711d51bd659349c8144383f2dc8a9e73aa6731c2c86ac7ade851ac

  • SSDEEP

    12288:O0Ws7IMtR4yVld8bzbBSre3hgFK/UqW53ZDj:O0bdkX1VcLP

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\4126660fd9526673567ffc1b966d5e9d831c42432a14617db44186ba02f5af63.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:832
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\4126660fd9526673567ffc1b966d5e9d831c42432a14617db44186ba02f5af63.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/112-0-0x0000000074EBE000-0x0000000074EBF000-memory.dmp

    Filesize

    4KB

  • memory/112-1-0x00000000021A0000-0x00000000021BC000-memory.dmp

    Filesize

    112KB

  • memory/112-2-0x0000000074EB0000-0x0000000075660000-memory.dmp

    Filesize

    7.7MB

  • memory/112-3-0x00000000048D0000-0x000000000490C000-memory.dmp

    Filesize

    240KB

  • memory/112-5-0x0000000074EB0000-0x0000000075660000-memory.dmp

    Filesize

    7.7MB

  • memory/112-6-0x0000000074EB0000-0x0000000075660000-memory.dmp

    Filesize

    7.7MB