Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05/08/2024, 06:57
Static task
static1
Behavioral task
behavioral1
Sample
613013e47d88fb716fa68362be7c23d0N.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
613013e47d88fb716fa68362be7c23d0N.dll
Resource
win10v2004-20240802-en
General
-
Target
613013e47d88fb716fa68362be7c23d0N.dll
-
Size
6KB
-
MD5
613013e47d88fb716fa68362be7c23d0
-
SHA1
c3faf9775d5d7cf84652634b9d0422ae7b024254
-
SHA256
b8d176b8e13bb746c4fa58f9cb25751ce3773786a441ad77e057955b8dcf6d2c
-
SHA512
859e79a53a49a820985ed90d35dfc24af5a076e74c5ff6ddea0edfd5ee425fad02e4441a869f73a980f6709f16d8f4fc6d42004cdf4468585dcea94100b51af2
-
SSDEEP
48:6WQV5YVOqtV0H1pw9ygYVUG0oOB+BDq9J5SC:8qtV0HAr4/OB+FqX5SC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2152 wrote to memory of 1660 2152 rundll32.exe 28 PID 2152 wrote to memory of 1660 2152 rundll32.exe 28 PID 2152 wrote to memory of 1660 2152 rundll32.exe 28 PID 2152 wrote to memory of 1660 2152 rundll32.exe 28 PID 2152 wrote to memory of 1660 2152 rundll32.exe 28 PID 2152 wrote to memory of 1660 2152 rundll32.exe 28 PID 2152 wrote to memory of 1660 2152 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\613013e47d88fb716fa68362be7c23d0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\613013e47d88fb716fa68362be7c23d0N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1660
-