Analysis
-
max time kernel
134s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 02:50
Behavioral task
behavioral1
Sample
2556-0-0x0000000074E80000-0x0000000074EBD000-memory.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2556-0-0x0000000074E80000-0x0000000074EBD000-memory.dll
Resource
win10v2004-20240709-en
General
-
Target
2556-0-0x0000000074E80000-0x0000000074EBD000-memory.dll
-
Size
244KB
-
MD5
61fb7154ef3152259479bba9385b3c5f
-
SHA1
e89ff962baf84a6f4c9e6adc251a6f6351946adb
-
SHA256
da7b7823c0d0a7e56dfc1628e816a81ca2ed6f0b1065ed623ff451820e702e72
-
SHA512
ebd09bf5ba31d7c34e97b23f7a3231e12faa2d47042c0a6f19475dfa2fdd4571ad3aadf432842ca261b28b24997ee987db772f3db33c02cb8bad9178f9e61181
-
SSDEEP
1536:7M/QG3c7SnbtXI6r2DaWufWH4CE2BUf1dlO9e6P8uz/Khf/jGXLkRjR3V:Cb3LJjKazuH8/7edChnKXyV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3332 wrote to memory of 888 3332 rundll32.exe 84 PID 3332 wrote to memory of 888 3332 rundll32.exe 84 PID 3332 wrote to memory of 888 3332 rundll32.exe 84 PID 888 wrote to memory of 2412 888 rundll32.exe 85 PID 888 wrote to memory of 2412 888 rundll32.exe 85 PID 888 wrote to memory of 2412 888 rundll32.exe 85 PID 2412 wrote to memory of 340 2412 rundll32.exe 86 PID 2412 wrote to memory of 340 2412 rundll32.exe 86 PID 2412 wrote to memory of 340 2412 rundll32.exe 86 PID 340 wrote to memory of 2476 340 rundll32.exe 87 PID 340 wrote to memory of 2476 340 rundll32.exe 87 PID 340 wrote to memory of 2476 340 rundll32.exe 87 PID 2476 wrote to memory of 4748 2476 rundll32.exe 88 PID 2476 wrote to memory of 4748 2476 rundll32.exe 88 PID 2476 wrote to memory of 4748 2476 rundll32.exe 88 PID 4748 wrote to memory of 4860 4748 rundll32.exe 89 PID 4748 wrote to memory of 4860 4748 rundll32.exe 89 PID 4748 wrote to memory of 4860 4748 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2556-0-0x0000000074E80000-0x0000000074EBD000-memory.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2556-0-0x0000000074E80000-0x0000000074EBD000-memory.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2556-0-0x0000000074E80000-0x0000000074EBD000-memory.dll,#13⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2556-0-0x0000000074E80000-0x0000000074EBD000-memory.dll,#14⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2556-0-0x0000000074E80000-0x0000000074EBD000-memory.dll,#15⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2556-0-0x0000000074E80000-0x0000000074EBD000-memory.dll,#16⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2556-0-0x0000000074E80000-0x0000000074EBD000-memory.dll,#17⤵
- System Location Discovery: System Language Discovery
PID:4860
-
-
-
-
-
-