Analysis

  • max time kernel
    93s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 11:40

General

  • Target

    8d913cb4bcb57a7c888d36613236c87faeb8f2b2c53154ce2dadc270135cc5bf.dll

  • Size

    21KB

  • MD5

    04cd13dca00ea3151a0e44b6a9c80d46

  • SHA1

    13d94efb3736d3830dc7281a20bc7f3ea33d90fa

  • SHA256

    8d913cb4bcb57a7c888d36613236c87faeb8f2b2c53154ce2dadc270135cc5bf

  • SHA512

    f364720e31f96cbfed57018b86a852023e42b213dfcafdc1c1c794fbd6aba9f7c665b99bc4a0344e641e4a6b58de75a2c9a3bbbe6568f83f9066e2083fe49b34

  • SSDEEP

    384:p5SgF17IBNoAoIaR5RA7kI2tH65yPOCcMf1+:p5SgF1IdaTGezPOZMf1+

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\8d913cb4bcb57a7c888d36613236c87faeb8f2b2c53154ce2dadc270135cc5bf.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:32
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\8d913cb4bcb57a7c888d36613236c87faeb8f2b2c53154ce2dadc270135cc5bf.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1712-0-0x0000000074B95000-0x0000000074B97000-memory.dmp

    Filesize

    8KB