Analysis

  • max time kernel
    148s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-10-2024 16:04

General

  • Target

    Proxy Tools and Grabbers/vProxy v1.4 by Yani/data/System.Data.SQLite.dll

  • Size

    944KB

  • MD5

    ce6481b5bb8c8e9b20df8e49e10f7941

  • SHA1

    3dc764f4cf9eff56b632fceb10abf6a8484d12cf

  • SHA256

    82aecf9b9064fba2fd08d859b66983ed6338bca0e34b8827f64a68a47b5f2dcf

  • SHA512

    b898ab9e2489bb13090308d8213b78065f60b0f76e67e50fae87fa397cbfbc00001cb9369c71a197f425ddd1c61e2c68f4023c9413aac33d51612e23c62af900

  • SSDEEP

    24576:2NQOW38FYn8so0ZypaIf6zQVp+qE1QJdQYh:2Nq3uspAjnFE1QJKs

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe "C:\Users\Admin\AppData\Local\Temp\Proxy Tools and Grabbers\vProxy v1.4 by Yani\data\System.Data.SQLite.dll",#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4664
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\Temp\Proxy Tools and Grabbers\vProxy v1.4 by Yani\data\System.Data.SQLite.dll",#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3276

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads