Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 11:38
Static task
static1
Behavioral task
behavioral1
Sample
02a208330d37c43bb54344d891426c80N.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
02a208330d37c43bb54344d891426c80N.dll
Resource
win10v2004-20240709-en
General
-
Target
02a208330d37c43bb54344d891426c80N.dll
-
Size
7KB
-
MD5
02a208330d37c43bb54344d891426c80
-
SHA1
d207aeae4c5b15f48fa1e080047dc496a6ffc604
-
SHA256
4412654236556c566b96c01437ddf54b6237480f0adcd0bb5c57fc1bae1bfea1
-
SHA512
14ca5a6c6afeeb487ee9606f07332342fe1a03a70071005d67a928112bbcc18c9662a5ceb0396b689a2b7275d821b06c79ec12de476ebd800c140ae38125f8e3
-
SSDEEP
48:66ay5YVO3EVkApc2wp8hH1NZn5EquglQ067YbPWRbABbgL3q9J5S2hmc:b3EVkApcX4Hiv0hbP3q3qX5S2hV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3008 wrote to memory of 3052 3008 rundll32.exe 29 PID 3008 wrote to memory of 3052 3008 rundll32.exe 29 PID 3008 wrote to memory of 3052 3008 rundll32.exe 29 PID 3008 wrote to memory of 3052 3008 rundll32.exe 29 PID 3008 wrote to memory of 3052 3008 rundll32.exe 29 PID 3008 wrote to memory of 3052 3008 rundll32.exe 29 PID 3008 wrote to memory of 3052 3008 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\02a208330d37c43bb54344d891426c80N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\02a208330d37c43bb54344d891426c80N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3052
-