Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 20:00

General

  • Target

    $PLUGINSDIR/zmdtm.dll

  • Size

    100KB

  • MD5

    d4b3308970835c85d3d24ad2f8ee3b4f

  • SHA1

    8a3722200f614f37a0a446c36df6dfcbd26ae138

  • SHA256

    14c94199dc9e370703b5579066d6b34a2055ab97fdf2675dd7ac8ec3616c3137

  • SHA512

    72b50aed7860dfa674a34e52a75b6a9aaf3529f4a8dcc7a622f5d00970855dd5cd70a0e9699fd9b79acdfb9a06411ecbee26c471e6a91e67851464dd7b4ca240

  • SSDEEP

    1536:gF15tzIksRHS1oD+ajCWmzx3e6fch6gqZ3ralsWjcdWRPbUK7xkm75Cm:gFDhWss0YKWRPbH7uol

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\zmdtm.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1192
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\zmdtm.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2232
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\zmdtm.dll,#1
        3⤵
          PID:456

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2232-0-0x0000000075406000-0x0000000075408000-memory.dmp

      Filesize

      8KB