Analysis

  • max time kernel
    13s
  • max time network
    15s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 13:49

General

  • Target

    439356d2b82c3f6dc8ae7363917219d85826795c5a01a4e7244cd7ddb73d7ef7.dll

  • Size

    9.0MB

  • MD5

    3a0ae3c552d8b3c767c502c40ff21ed0

  • SHA1

    86c12e1870bc30fd7705eed964cb4beaa78e28e7

  • SHA256

    439356d2b82c3f6dc8ae7363917219d85826795c5a01a4e7244cd7ddb73d7ef7

  • SHA512

    c6f70330e4e9ae8f0cef855857fb15d88e4119587e1861e333e454cd995c20b93bc6366d4800e2ae5a356250a1a7e67b8fb30998fed0297cca918c0110ba13a0

  • SSDEEP

    98304:hWy+Ju3OYymoQyXIoZ96ahkrwOoJonIck466DskVqO1nADF0Iute/6CWxHHqEkJB:0H8eRJrGroRGL1ADiIkTCGH3k5JD

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\439356d2b82c3f6dc8ae7363917219d85826795c5a01a4e7244cd7ddb73d7ef7.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5032
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\439356d2b82c3f6dc8ae7363917219d85826795c5a01a4e7244cd7ddb73d7ef7.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3944-0-0x0000000002D20000-0x00000000035C6000-memory.dmp

    Filesize

    8.6MB

  • memory/3944-1-0x0000000002D20000-0x00000000035C6000-memory.dmp

    Filesize

    8.6MB