Analysis

  • max time kernel
    94s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 12:25

General

  • Target

    417c431533b04b59517337a19011ee8e49421e7f93455687654c3b4bc5c9bb90N.dll

  • Size

    6KB

  • MD5

    0d182ea43aa641d1ccf4b2231e06c140

  • SHA1

    3f93c62362794aaef86065af55dd9fec166705d4

  • SHA256

    417c431533b04b59517337a19011ee8e49421e7f93455687654c3b4bc5c9bb90

  • SHA512

    2ee26d0489c80cec351687ef7e857de25f9cf21b5048c7e9e4b420741f8f4fbd585d4df9f703b8e0c9659a85fa93839962cb2c812c01711fedb170402e65248b

  • SSDEEP

    48:6EQt5YVOSVVEPy+wEMmqiHNpU10nB+BDq9J5SV3DY:CSVVEPozmB7ZB+FqX5S1D

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\417c431533b04b59517337a19011ee8e49421e7f93455687654c3b4bc5c9bb90N.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2696
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\417c431533b04b59517337a19011ee8e49421e7f93455687654c3b4bc5c9bb90N.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads