Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-10-2024 04:26

General

  • Target

    $PLUGINSDIR/NSISdl.dll

  • Size

    96KB

  • MD5

    da5be8a2066d67c93265dcd6a9c9dddf

  • SHA1

    8fe968e27e259530dfb435511b1dbe4d167bfda4

  • SHA256

    30dc225ef4a4e084ee65c0912d07abdd939d5a49fb3fda535d6c41ac6b112f0b

  • SHA512

    d7a98903adca16124c538a12ae912432d6ebc1874e9beaddf394004e96a33a58ab68f5f2e2771b83c56cfc53e05e314d4ab79d5c034459d7bcfd31090fd4bf97

  • SSDEEP

    1536:8/fL6f67dFj7xWkdX+zHK7K2h9PORs7dR0h1UgDH40NF:8nL6f67dhxWW00tYwK1UgT46

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\NSISdl.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4792
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\NSISdl.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1364
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1364 -s 624
        3⤵
        • Program crash
        PID:1532
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1364 -ip 1364
    1⤵
      PID:1224

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1364-0-0x0000000070C00000-0x0000000070C23000-memory.dmp

      Filesize

      140KB