Analysis

  • max time kernel
    96s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-11-2024 05:47

General

  • Target

    P2SBase.dll

  • Size

    512KB

  • MD5

    894ab861e608eacbac24280ab234368f

  • SHA1

    e283ef8757f04b0252ec5dce22e6e8094bed7737

  • SHA256

    687df23126f0da0348f8c5165b11b72982636177c6f53f5fe827c3f036fd83bb

  • SHA512

    26a78e26a60bfd48e93b1e61ede2cc2a7c9c9cb61bdd729f86b2692fed0eb4fedc72953ca83bc3fc945a0cc21d3d3232e73a03be39ea5755ddcc0dbd8ef3bed3

  • SSDEEP

    6144:0nhC4TaYEJE3p+i0p6VXErbTZdoDVPfQlzJebMMJWvNnEo1gQB:0nh/TaYdQp6Vw3oDVwlzKdWvuohB

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\P2SBase.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3672
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\P2SBase.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3984-0-0x0000000002610000-0x000000000266D000-memory.dmp

    Filesize

    372KB