Analysis

  • max time kernel
    95s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-01-2025 06:58

General

  • Target

    8a6baa91bedcb5ef5427164e0220e4c22de63ac00afe8b298d5d918f7ad7a0f7N.dll

  • Size

    818KB

  • MD5

    916147b7a063552510819a09d89b3510

  • SHA1

    090c76f7d95399d9c1d0cb47ecb539601a358d75

  • SHA256

    8a6baa91bedcb5ef5427164e0220e4c22de63ac00afe8b298d5d918f7ad7a0f7

  • SHA512

    fdf04b79062c8b2de332afe102b684669655eb92447c51627c0ff0b10c79fe36c592ea923f6a9a5e67663493f43bcedd28b068a69f4b3e1316692643150517ff

  • SSDEEP

    12288:YbMZqCDuaVRL7+94mLnsMBOzlHih4QUcP4EGu7:fqCjRL7+9jIMoZHih4QUA7

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\8a6baa91bedcb5ef5427164e0220e4c22de63ac00afe8b298d5d918f7ad7a0f7N.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4572
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\8a6baa91bedcb5ef5427164e0220e4c22de63ac00afe8b298d5d918f7ad7a0f7N.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:5108

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads