Analysis

  • max time kernel
    97s
  • max time network
    159s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    02/12/2024, 16:10

General

  • Target

    tmpfile-main/Dragon.dll

  • Size

    720KB

  • MD5

    92b359433130842cccf2a49f58a57a93

  • SHA1

    9e4f66544adcf9e3ea125fb3efaae3dd004f0a15

  • SHA256

    10b6a7c2207a1db4fe6cd70acd8989dcb05769ca944a02166f9475c06c99817f

  • SHA512

    9a9fa9538dc9b815da84c904b97a2b66b73a3f611d9635ebb4270dd3df8ab617e425c1229d25319f85c8e693efe6e1b917a97ce87c86568f9a9ba003fa1f9f8c

  • SSDEEP

    12288:OrUI8Ff3dWZ0PTu2TGE0TY/3K56+OlHFcEh9iqO9reVeD0DFjehnH:OYlFf3dW2PTu2L/3Kc+OlHRh1OqwhnH

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\tmpfile-main\Dragon.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3364
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\tmpfile-main\Dragon.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads