Analysis
-
max time kernel
94s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
30-07-2024 20:39
Static task
static1
Behavioral task
behavioral1
Sample
Order 54409880043.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Order 54409880043.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral5
Sample
215bk9gx2i8m.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
215bk9gx2i8m.dll
Resource
win10v2004-20240730-en
General
-
Target
215bk9gx2i8m.dll
-
Size
11KB
-
MD5
3c1357905197e81f502c9b0c4630c47c
-
SHA1
29121873e5d0504b22ee39a76f9538860184131d
-
SHA256
0d330bbfd4cdef061cd8be5d5e9aac38484b197b52192327ddf1d2591505323c
-
SHA512
833cf083f7ec5ece597ac0f6437321f12d140e671710f3aa0d9a789c20241ee2ba2492cf2b5d4bc0e93d12d6b4ac00e8f700502c284b44b2ab1bdb184bae7c03
-
SSDEEP
96:OvN1R2Rhg/EerHXJY5joqgQZYSp4Ymru9PPEGvM3Q8BHG0LjdWqam8+4pb3lFrXB:O7Mvg350fP4fuc9Hfwxm8BxFXuNyyP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
rundll32.exepid Process 2100 rundll32.exe 2100 rundll32.exe 2100 rundll32.exe 2100 rundll32.exe 2100 rundll32.exe 2100 rundll32.exe 2100 rundll32.exe 2100 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid Process procid_target PID 5008 wrote to memory of 2100 5008 rundll32.exe 81 PID 5008 wrote to memory of 2100 5008 rundll32.exe 81 PID 5008 wrote to memory of 2100 5008 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\215bk9gx2i8m.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\215bk9gx2i8m.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2100
-