Analysis

  • max time kernel
    91s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2024, 11:10

General

  • Target

    4764a964f5f76ceaa9e07e96f74dfafd734bf2cd963e27f99ecceb20e9bb2ac0.dll

  • Size

    15.7MB

  • MD5

    effd60c8284083b7bd0a13e7f46a287c

  • SHA1

    f400c624c71db3dc44f38d4f6324ce169b91b973

  • SHA256

    4764a964f5f76ceaa9e07e96f74dfafd734bf2cd963e27f99ecceb20e9bb2ac0

  • SHA512

    ff9818c0b0bf295c00722deb62f6ba81cc0f18ff259d33697b0a498b97d3f844431bc6e05ef613b0be4428b4797bc9a1d26e57901bf9ca17e23302a05ce3f325

  • SSDEEP

    49152:cA0UcsHN6+Z6XJW9s4M+lYOZdW84QU1ZUgGave:cfUDt9c5W24Z6y48jav

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\4764a964f5f76ceaa9e07e96f74dfafd734bf2cd963e27f99ecceb20e9bb2ac0.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:388
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\4764a964f5f76ceaa9e07e96f74dfafd734bf2cd963e27f99ecceb20e9bb2ac0.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads