Analysis
-
max time kernel
16s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 18:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3ef0258f2994017a9cae3555e9fa2c30N.dll
Resource
win7-20240705-en
2 signatures
120 seconds
Behavioral task
behavioral2
Sample
3ef0258f2994017a9cae3555e9fa2c30N.dll
Resource
win10v2004-20240709-en
2 signatures
120 seconds
General
-
Target
3ef0258f2994017a9cae3555e9fa2c30N.dll
-
Size
3KB
-
MD5
3ef0258f2994017a9cae3555e9fa2c30
-
SHA1
b18f275977d69da30f20dfa9d595634069b0b157
-
SHA256
4755bb6f561d5a662cfb783aff6f68a23ca0aa57224b3faa43e6979f843eddcd
-
SHA512
b76c2eb1d7efb7b9891f6c17233763e76a421849e4dc42ca0abf3cb3fc4d3c32cdbb365a4b2ac98296d3ec255b9c3200c692b3295b5eb2dc97f77484807899f4
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1148 wrote to memory of 1044 1148 rundll32.exe 29 PID 1148 wrote to memory of 1044 1148 rundll32.exe 29 PID 1148 wrote to memory of 1044 1148 rundll32.exe 29 PID 1148 wrote to memory of 1044 1148 rundll32.exe 29 PID 1148 wrote to memory of 1044 1148 rundll32.exe 29 PID 1148 wrote to memory of 1044 1148 rundll32.exe 29 PID 1148 wrote to memory of 1044 1148 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3ef0258f2994017a9cae3555e9fa2c30N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3ef0258f2994017a9cae3555e9fa2c30N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1044
-