Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 09:49
Static task
static1
Behavioral task
behavioral1
Sample
18f24841651461bd84a5eac08be9bce9eab54b133b0e837d5298dac44e199d5f.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
18f24841651461bd84a5eac08be9bce9eab54b133b0e837d5298dac44e199d5f.dll
Resource
win10v2004-20240226-en
General
-
Target
18f24841651461bd84a5eac08be9bce9eab54b133b0e837d5298dac44e199d5f.dll
-
Size
1.4MB
-
MD5
28267ea322e3975f1e98c64a1c77f509
-
SHA1
e1d92e085df142d703ed9fd9c65ed92562a759fa
-
SHA256
18f24841651461bd84a5eac08be9bce9eab54b133b0e837d5298dac44e199d5f
-
SHA512
2c0bd061a51e48c057fdd0b05dc959c48e79ef3df3ca1abec105b8be2aa53f416f92c109c23029a11d4d3e7e75529215877d41b5bfe5d462d844b3bae29c1a42
-
SSDEEP
24576:bSOCJ+Kt7ADfN0l6GMwF5fdn17nlz/Nz/9z/8z/Uz/Nz/Oz/aVuADDePddFkEPSr:JtTGIwloSpeQiMcRc/s+kobXnz/q/xnQ
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 1676 rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1676 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1976 wrote to memory of 1676 1976 rundll32.exe 86 PID 1976 wrote to memory of 1676 1976 rundll32.exe 86 PID 1976 wrote to memory of 1676 1976 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\18f24841651461bd84a5eac08be9bce9eab54b133b0e837d5298dac44e199d5f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\18f24841651461bd84a5eac08be9bce9eab54b133b0e837d5298dac44e199d5f.dll,#12⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:1676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5345e3700c5b584ca43a6748670480864
SHA190802b6139b4ad5c8b218e137af9e5466ad4d0fa
SHA256e952eeacb54e0d9c07da6db899c7012b49cfd19b19ec46b99321ebe831b53a7c
SHA5120c17385d336dd25b36e06c2c323694ec43683bf6c179985989eadd680df190bda220ddbd4afa548d6827877fdcfde06f67fd692ebe37653b574d00f5e377a566