Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 21:49
Behavioral task
behavioral1
Sample
4840d35877647678e6f5bb0f1df6043599a9b5ece584cd69f6f531bc384cc08f.dll
Resource
win7-20240708-en
3 signatures
150 seconds
General
-
Target
4840d35877647678e6f5bb0f1df6043599a9b5ece584cd69f6f531bc384cc08f.dll
-
Size
76KB
-
MD5
fcb9c2601553d2f6bc83b25d3ef2baad
-
SHA1
617fb117287d6e2f8c6153bfe3b1ddace6757644
-
SHA256
4840d35877647678e6f5bb0f1df6043599a9b5ece584cd69f6f531bc384cc08f
-
SHA512
7d761594092b1935ca64b54022faceadd8e5aabc395e53bd5e4769b4ee6ff28725638563f8daa63e5812e5fdfefb552362a16e071a55f708f0a05dc35de4c81b
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZqxM8V/k:c8y93KQjy7G55riF1cMo03R
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2144-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2144-1-0x0000000010000000-0x0000000010030000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2144 2168 rundll32.exe 31 PID 2168 wrote to memory of 2144 2168 rundll32.exe 31 PID 2168 wrote to memory of 2144 2168 rundll32.exe 31 PID 2168 wrote to memory of 2144 2168 rundll32.exe 31 PID 2168 wrote to memory of 2144 2168 rundll32.exe 31 PID 2168 wrote to memory of 2144 2168 rundll32.exe 31 PID 2168 wrote to memory of 2144 2168 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4840d35877647678e6f5bb0f1df6043599a9b5ece584cd69f6f531bc384cc08f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4840d35877647678e6f5bb0f1df6043599a9b5ece584cd69f6f531bc384cc08f.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2144
-