Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07/08/2024, 08:30
Static task
static1
Behavioral task
behavioral1
Sample
91fb138b9f429916a60617175d9b8da0N.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
91fb138b9f429916a60617175d9b8da0N.dll
Resource
win10v2004-20240802-en
General
-
Target
91fb138b9f429916a60617175d9b8da0N.dll
-
Size
5KB
-
MD5
91fb138b9f429916a60617175d9b8da0
-
SHA1
3399da4b9ae6999f3a5b6451571a36751d240977
-
SHA256
6d0fd45a4907e773cd3c4e000e9d83db97b39dea5d8de7f65498ffd6a72d82ad
-
SHA512
a750d7dcce1e3b8eccce3711eb513f6b131ea86304aad37252cdfb1c049d8e748a2767aeb15e9020a120af8885b45db469d707e5c1c34206583677dc371c2518
-
SSDEEP
96:DixZjmjtjd8jPjcZGR5TIXyyWHAHmqy7heC:unSR6bgYwlbmqyZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1872 wrote to memory of 1880 1872 rundll32.exe 31 PID 1872 wrote to memory of 1880 1872 rundll32.exe 31 PID 1872 wrote to memory of 1880 1872 rundll32.exe 31 PID 1872 wrote to memory of 1880 1872 rundll32.exe 31 PID 1872 wrote to memory of 1880 1872 rundll32.exe 31 PID 1872 wrote to memory of 1880 1872 rundll32.exe 31 PID 1872 wrote to memory of 1880 1872 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\91fb138b9f429916a60617175d9b8da0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\91fb138b9f429916a60617175d9b8da0N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1880
-