Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-12-2024 12:56

General

  • Target

    Paranoid Checker 4.1.7/SMDiagnostics.dll

  • Size

    118KB

  • MD5

    f1d92ac71001bcc24b99044ee675619f

  • SHA1

    93537fe45921accef1a68f025748bd586447b77c

  • SHA256

    5df3a2e0329d7668ad0f6c426f6e4c6d1ecd45225b2c39d96b15cd7b6a1bbe53

  • SHA512

    fbf63f95afa2bd6d411d1c8a3299ba20f6fa3895cffd87bdff98d8b2540a4b98e306016bf6a82bb1678a1e078e84e3ec095c660d4d09490b8397f6971a1d2396

  • SSDEEP

    1536:3PpCne1hkJBWlt/hFrVI0FzAiVjJ+nD2D+Fye43G8m+6dAERoHYDQ76Kh:3RIQkB0tJtVVVjJ6D2DIH42RNAF4DWb

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe "C:\Users\Admin\AppData\Local\Temp\Paranoid Checker 4.1.7\SMDiagnostics.dll",#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3520
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\Temp\Paranoid Checker 4.1.7\SMDiagnostics.dll",#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads