Analysis

  • max time kernel
    135s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2024, 18:46

General

  • Target

    $PLUGINSDIR/dlmgn.exe

  • Size

    369KB

  • MD5

    3c8fcdd5824e8194f999e9ca50c3c751

  • SHA1

    89ffa620df2c41641dcb4af815c0e381dcd2a4da

  • SHA256

    9c362ee61694e130bd904bfcf7c32c33851ab106e5b0121f800c31e42636d870

  • SHA512

    dc6b2ceb1b2847f53f866a154a6ace2faf3782ce74df4ed3920fbc73994796d0518bc1ef06648d4800e1ace8462d1af11cdb8b5ecbbf2d5d3389e2a439764f2d

  • SSDEEP

    6144:CRhs1cwmi3K1L9E5ThjLhBj7JpKlgGOaGznraFJhn6I7:CDs+wmiKw1nfK1OucI7

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\dlmgn.exe
    "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\dlmgn.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops file in Windows directory
    • Modifies system certificate store
    PID:4100

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4100-0-0x00007FFA36B75000-0x00007FFA36B76000-memory.dmp

    Filesize

    4KB

  • memory/4100-1-0x00007FFA368C0000-0x00007FFA37261000-memory.dmp

    Filesize

    9.6MB

  • memory/4100-2-0x00007FFA368C0000-0x00007FFA37261000-memory.dmp

    Filesize

    9.6MB

  • memory/4100-11-0x00007FFA36B75000-0x00007FFA36B76000-memory.dmp

    Filesize

    4KB

  • memory/4100-12-0x000000001BB60000-0x000000001BB70000-memory.dmp

    Filesize

    64KB

  • memory/4100-15-0x000000001CA10000-0x000000001CEDE000-memory.dmp

    Filesize

    4.8MB

  • memory/4100-16-0x000000001CF80000-0x000000001D01C000-memory.dmp

    Filesize

    624KB

  • memory/4100-18-0x00007FFA368C0000-0x00007FFA37261000-memory.dmp

    Filesize

    9.6MB