Overview
overview
10Static
static
106b9d5ed62b...18.exe
windows7-x64
76b9d5ed62b...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3AutoUpdaterUI.exe
windows7-x64
3AutoUpdaterUI.exe
windows10-2004-x64
3Autoupdate...te.dll
windows7-x64
5Autoupdate...te.dll
windows10-2004-x64
5Autoupdate...er.exe
windows7-x64
3Autoupdate...er.exe
windows10-2004-x64
3Bind/AVCheck.dll
windows7-x64
3Bind/AVCheck.dll
windows10-2004-x64
3Bind/GetAV.exe
windows7-x64
6Bind/GetAV.exe
windows10-2004-x64
6Bind/HTTPD...UI.exe
windows7-x64
3Bind/HTTPD...UI.exe
windows10-2004-x64
3DevCfg.dll
windows7-x64
5DevCfg.dll
windows10-2004-x64
5DockHelp.dll
windows7-x64
3DockHelp.dll
windows10-2004-x64
3DockHelpex.dll
windows7-x64
3DockHelpex.dll
windows10-2004-x64
3DriveTheLife.exe
windows7-x64
10DriveTheLife.exe
windows10-2004-x64
10hdaudbus.sys
windows7-x64
1hdaudbus.sys
windows10-2004-x64
1Drivers/wn...UI.dll
windows7-x64
3Drivers/wn...UI.dll
windows10-2004-x64
3Drivers/wn...SP.dll
windows7-x64
3Drivers/wn...SP.dll
windows10-2004-x64
3Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-10-2024 18:33
Behavioral task
behavioral1
Sample
6b9d5ed62bf77ebcf1d9a4ce12eeef6f_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
6b9d5ed62bf77ebcf1d9a4ce12eeef6f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
AutoUpdaterUI.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
AutoUpdaterUI.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Autoupdater/CheckUpdate.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Autoupdater/CheckUpdate.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Autoupdater/DTLUpdater.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
Autoupdater/DTLUpdater.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Bind/AVCheck.dll
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
Bind/AVCheck.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Bind/GetAV.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Bind/GetAV.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Bind/HTTPDownloadUI.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Bind/HTTPDownloadUI.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
DevCfg.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
DevCfg.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
DockHelp.dll
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
DockHelp.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
DockHelpex.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
DockHelpex.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
DriveTheLife.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
DriveTheLife.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
hdaudbus.sys
Resource
win7-20240729-en
Behavioral task
behavioral28
Sample
hdaudbus.sys
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Drivers/wnd7audio/SysFxUI.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Drivers/wnd7audio/SysFxUI.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Drivers/wnd7audio/WMALFXGFXDSP.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Drivers/wnd7audio/WMALFXGFXDSP.dll
Resource
win10v2004-20241007-en
General
-
Target
DriveTheLife.exe
-
Size
1.1MB
-
MD5
2d4b22597d208d56ce337398f2574c8e
-
SHA1
c676d6e8452ce43a1a69a97f767bad8c1daf68be
-
SHA256
6125f323bd28e7092d2e8191978fddad248a0d9899e7f4159dbc218c27128a33
-
SHA512
89f72fa6d26a9a6b610ab9b12378d6f2f39b71e2f917809f491419f6754301d349e8b9429604d0238da702eb5c70b858d1f72a22d00d876265d39e19bb36e83e
-
SSDEEP
24576:OAQkUx9yzj53OsPvz4jUkO07qElhSxdGi:4kUxKfP07qFxd
Malware Config
Signatures
-
Panda Stealer payload 2 IoCs
resource yara_rule behavioral25/memory/2904-8-0x00000000020F0000-0x00000000021B2000-memory.dmp family_pandastealer behavioral25/memory/2672-17-0x0000000002430000-0x00000000024F2000-memory.dmp family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 14 1256 rundll32.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 DriveTheLife.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\ DriveTheLife.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DriveTheLife.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DriveTheLife.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AutoUpdaterUI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main DriveTheLife.exe -
Modifies registry class 53 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{30579EBD-2D69-49CF-B098-258AC820E7E4}\ = "IDtlBank" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20D67FF2-33D8-4928-914F-553076FD8DB2}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20D67FF2-33D8-4928-914F-553076FD8DB2}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20D67FF2-33D8-4928-914F-553076FD8DB2}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20D67FF2-33D8-4928-914F-553076FD8DB2}\AppID = "{8E81247B-00C6-44BA-875C-737FD12149A6}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{30579EBD-2D69-49CF-B098-258AC820E7E4}\TypeLib\ = "{50554412-1675-4043-A864-F7A30777EA18}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\DtlDock.DLL\AppID = "{8E81247B-00C6-44BA-875C-737FD12149A6}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DtlDock.DtlBank.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20D67FF2-33D8-4928-914F-553076FD8DB2}\Implemented Categories\{00021492-0000-0000-C000-000000000046} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{30579EBD-2D69-49CF-B098-258AC820E7E4}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{50554412-1675-4043-A864-F7A30777EA18}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{50554412-1675-4043-A864-F7A30777EA18}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{30579EBD-2D69-49CF-B098-258AC820E7E4}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{8E81247B-00C6-44BA-875C-737FD12149A6} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{30579EBD-2D69-49CF-B098-258AC820E7E4}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{30579EBD-2D69-49CF-B098-258AC820E7E4}\TypeLib\ = "{50554412-1675-4043-A864-F7A30777EA18}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{8E81247B-00C6-44BA-875C-737FD12149A6}\ = "DtlDock" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20D67FF2-33D8-4928-914F-553076FD8DB2}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{50554412-1675-4043-A864-F7A30777EA18}\1.0\0\win64\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\DtlDock64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DtlDock.DtlBank\CurVer\ = "DtlDock.DtlBand.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{30579EBD-2D69-49CF-B098-258AC820E7E4}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20D67FF2-33D8-4928-914F-553076FD8DB2}\TypeLib\ = "{50554412-1675-4043-A864-F7A30777EA18}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{50554412-1675-4043-A864-F7A30777EA18}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\DtlDock.DLL regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20D67FF2-33D8-4928-914F-553076FD8DB2} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{30579EBD-2D69-49CF-B098-258AC820E7E4}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{30579EBD-2D69-49CF-B098-258AC820E7E4}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{50554412-1675-4043-A864-F7A30777EA18}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DtlDock.DtlBank regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20D67FF2-33D8-4928-914F-553076FD8DB2}\ = "DriveTheLife Monitor" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DtlDock.DtlBank\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DtlDock.DtlBank\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{50554412-1675-4043-A864-F7A30777EA18}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20D67FF2-33D8-4928-914F-553076FD8DB2}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{30579EBD-2D69-49CF-B098-258AC820E7E4} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DtlDock.DtlBank\ = "DtlBand" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DtlDock.DtlBank\CLSID\ = "{20D67FF2-33D8-4928-914F-553076FD8DB2}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{30579EBD-2D69-49CF-B098-258AC820E7E4}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DtlDock.DtlBank.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DtlDock.DtlBank.1\ = "DtlBand" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{50554412-1675-4043-A864-F7A30777EA18}\1.0\0\win64 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{30579EBD-2D69-49CF-B098-258AC820E7E4}\ = "IDtlBank" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20D67FF2-33D8-4928-914F-553076FD8DB2}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\DtlDock64.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20D67FF2-33D8-4928-914F-553076FD8DB2}\Implemented Categories regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{30579EBD-2D69-49CF-B098-258AC820E7E4} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DtlDock.DtlBank.1\CLSID\ = "{20D67FF2-33D8-4928-914F-553076FD8DB2}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20D67FF2-33D8-4928-914F-553076FD8DB2}\VersionIndependentProgID\ = "DtlDock.DtlBand" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20D67FF2-33D8-4928-914F-553076FD8DB2}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{50554412-1675-4043-A864-F7A30777EA18} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{50554412-1675-4043-A864-F7A30777EA18}\1.0\ = "DtlDock 1.0 ÀàÐÍ¿â" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{50554412-1675-4043-A864-F7A30777EA18}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20D67FF2-33D8-4928-914F-553076FD8DB2}\ProgID\ = "DtlDock.DtlBand.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{30579EBD-2D69-49CF-B098-258AC820E7E4}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2688 AutoUpdaterUI.exe 2672 DriveTheLife.exe 2672 DriveTheLife.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 468 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 2672 DriveTheLife.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2672 DriveTheLife.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2672 DriveTheLife.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 2904 DriveTheLife.exe 2672 DriveTheLife.exe 2688 AutoUpdaterUI.exe 2672 DriveTheLife.exe 2672 DriveTheLife.exe 2672 DriveTheLife.exe 2672 DriveTheLife.exe 2672 DriveTheLife.exe 2672 DriveTheLife.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2672 2904 DriveTheLife.exe 30 PID 2904 wrote to memory of 2672 2904 DriveTheLife.exe 30 PID 2904 wrote to memory of 2672 2904 DriveTheLife.exe 30 PID 2904 wrote to memory of 2672 2904 DriveTheLife.exe 30 PID 2672 wrote to memory of 2688 2672 DriveTheLife.exe 31 PID 2672 wrote to memory of 2688 2672 DriveTheLife.exe 31 PID 2672 wrote to memory of 2688 2672 DriveTheLife.exe 31 PID 2672 wrote to memory of 2688 2672 DriveTheLife.exe 31 PID 2672 wrote to memory of 2688 2672 DriveTheLife.exe 31 PID 2672 wrote to memory of 2688 2672 DriveTheLife.exe 31 PID 2672 wrote to memory of 2688 2672 DriveTheLife.exe 31 PID 2672 wrote to memory of 2836 2672 DriveTheLife.exe 32 PID 2672 wrote to memory of 2836 2672 DriveTheLife.exe 32 PID 2672 wrote to memory of 2836 2672 DriveTheLife.exe 32 PID 2672 wrote to memory of 2836 2672 DriveTheLife.exe 32 PID 2672 wrote to memory of 2836 2672 DriveTheLife.exe 32 PID 2672 wrote to memory of 2836 2672 DriveTheLife.exe 32 PID 2672 wrote to memory of 2836 2672 DriveTheLife.exe 32 PID 2836 wrote to memory of 2708 2836 regsvr32.exe 33 PID 2836 wrote to memory of 2708 2836 regsvr32.exe 33 PID 2836 wrote to memory of 2708 2836 regsvr32.exe 33 PID 2836 wrote to memory of 2708 2836 regsvr32.exe 33 PID 2836 wrote to memory of 2708 2836 regsvr32.exe 33 PID 2836 wrote to memory of 2708 2836 regsvr32.exe 33 PID 2836 wrote to memory of 2708 2836 regsvr32.exe 33 PID 2672 wrote to memory of 1256 2672 DriveTheLife.exe 35 PID 2672 wrote to memory of 1256 2672 DriveTheLife.exe 35 PID 2672 wrote to memory of 1256 2672 DriveTheLife.exe 35 PID 2672 wrote to memory of 1256 2672 DriveTheLife.exe 35 PID 2672 wrote to memory of 1256 2672 DriveTheLife.exe 35 PID 2672 wrote to memory of 1256 2672 DriveTheLife.exe 35 PID 2672 wrote to memory of 1256 2672 DriveTheLife.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\DriveTheLife.exe"C:\Users\Admin\AppData\Local\Temp\DriveTheLife.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\DriveTheLife.exe"C:\Users\Admin\AppData\Local\Temp\DriveTheLife.exe" /drivethelife2⤵
- Writes to the Master Boot Record (MBR)
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\AutoUpdaterUI.exe"C:\Users\Admin\AppData\Local\Temp\AutoUpdaterUI.exe" /auto_updater /dtl_2010 "-dtlapp C:\Users\Admin\AppData\Local\Temp\DriveTheLife.exe" /silent "-dtlver 3.1.28.32" "-dtlarg /drivethelife"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2688
-
-
C:\Windows\SysWOW64\regsvr32.exe/s "C:\Users\Admin\AppData\Local\Temp\DtlDock64.dll"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\system32\regsvr32.exe/s "C:\Users\Admin\AppData\Local\Temp\DtlDock64.dll"4⤵
- Modifies registry class
PID:2708
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\HwInfo.dll" LocalInfo de30182ee7a2a430be16153b8bb93c3c1bb8925d67c72d3⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:1256
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145B
MD5337409c38ebe6339480724f24a404338
SHA1832384c5540c890af697acc218cdf77dbabdba07
SHA256ca3ce400e32ada7277ae095eee4267f4c066581e060a73500f147a43eda311d9
SHA512c4302c442005f73444b158099f0bf6a06ff4e0740c531ac5a45b6cfd962ac75c17703142a0e73ef889e7baf2bf22e886f160cf7093b34a2ed84001c56bf260e9
-
Filesize
158B
MD53f118854db57ff6c8e141118ff28d6e9
SHA1e4214fe3ab4113f9cdffdca2efdbfd3452fa3152
SHA2562de58dd033ab831ae479ea3ad994b428e6e1ad38c67e5f0bd9f70db6e15065b3
SHA5128f8fc765c38c71d4506a9d6d7d69a57d1c607c1451cd0a0544d89f33a2ee22982724219859a9a408d5cc604c0a4f434c43f3df4c6573905a2897795b96955d1e