Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
06-08-2024 23:57
Static task
static1
Behavioral task
behavioral1
Sample
848c02581b9bbb4db07a2320cf4d5d6b8db146e1873a6daff04db9746cc6dab7.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
848c02581b9bbb4db07a2320cf4d5d6b8db146e1873a6daff04db9746cc6dab7.dll
Resource
win10v2004-20240802-en
General
-
Target
848c02581b9bbb4db07a2320cf4d5d6b8db146e1873a6daff04db9746cc6dab7.dll
-
Size
1.6MB
-
MD5
899fefad5b77d092534a408013e2eb8a
-
SHA1
c6ac68c0f4eff35d8e59c8a1a5a79919e0979476
-
SHA256
848c02581b9bbb4db07a2320cf4d5d6b8db146e1873a6daff04db9746cc6dab7
-
SHA512
4e3b2f8e290acb3f0f004b22599a19e0ff93a6ca7dbc5e1669decabce1b818eee4b359777a653bde1f318fef117515f71a658bd80299db032cfd386d112e8701
-
SSDEEP
49152:oif7Q+3wsTx2/SkpO57jQaxSM9mMmbQ3/9:pfMsTxlhUsSMonbc9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2692 2064 rundll32.exe 30 PID 2064 wrote to memory of 2692 2064 rundll32.exe 30 PID 2064 wrote to memory of 2692 2064 rundll32.exe 30 PID 2064 wrote to memory of 2692 2064 rundll32.exe 30 PID 2064 wrote to memory of 2692 2064 rundll32.exe 30 PID 2064 wrote to memory of 2692 2064 rundll32.exe 30 PID 2064 wrote to memory of 2692 2064 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\848c02581b9bbb4db07a2320cf4d5d6b8db146e1873a6daff04db9746cc6dab7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\848c02581b9bbb4db07a2320cf4d5d6b8db146e1873a6daff04db9746cc6dab7.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2692
-