Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-12-2024 17:13

General

  • Target

    $PLUGINSDIR/nibn.dll

  • Size

    355KB

  • MD5

    2903025272487bdafaac262605b15219

  • SHA1

    c9175643f7ee479e45cb07a475d6ed2570e5fd3e

  • SHA256

    729a24f2784fd7f9f02f9696e692f629370a150a1ed5e47b74efa2b0b5bafd72

  • SHA512

    d9d0826386d3ce95f94269754a65b2bb37571b895e67df7a9aa426e46965cf393418abf030ba6a1b9e3de020609d598f821aac7c150e339f12cfc112ee1d4bd3

  • SSDEEP

    6144:5aABsU0Ln/bSe0pcKSdl+l+Ty129bbPUx9Uxu0keeFhkP:sABt0L/bSnpSdlBi29b09Uxuhre

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nibn.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4244
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nibn.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads