Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2024 01:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
LisectAVT_2403002B_194.dll
Resource
win7-20240708-en
windows7-x64
3 signatures
150 seconds
General
-
Target
LisectAVT_2403002B_194.dll
-
Size
181KB
-
MD5
2b158e10981db4362648ff36f5050a32
-
SHA1
3c7559077170be28f204722fced4508626cca3ec
-
SHA256
168f29f10d9d5bace166fe82fe0ae1d63e4de0658bc21e606e615e34f4555ab2
-
SHA512
df169a20551cc5e30a0b258b96641486a9404d49f8f397177a6f37738430ab8cca8b8a245a5572a7cca69d2a6bb87afeb0edaaf701e025e16837c8ad681beff7
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0R:jDgtfRQUHPw06MoV2nwTBlhm8Z
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4244 wrote to memory of 4528 4244 rundll32.exe 84 PID 4244 wrote to memory of 4528 4244 rundll32.exe 84 PID 4244 wrote to memory of 4528 4244 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\LisectAVT_2403002B_194.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\LisectAVT_2403002B_194.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4528
-