Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08/08/2024, 04:25
Static task
static1
Behavioral task
behavioral1
Sample
e4a559ef53762be46ddaa35a4dfca32c23de74e396b060d3ed6a678022e85b51.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e4a559ef53762be46ddaa35a4dfca32c23de74e396b060d3ed6a678022e85b51.dll
Resource
win10v2004-20240802-en
General
-
Target
e4a559ef53762be46ddaa35a4dfca32c23de74e396b060d3ed6a678022e85b51.dll
-
Size
6KB
-
MD5
52c8fadcb8caf19478e536aed649e922
-
SHA1
2f5081290fec703c3e31c42ea40824e3e8e1c0dc
-
SHA256
e4a559ef53762be46ddaa35a4dfca32c23de74e396b060d3ed6a678022e85b51
-
SHA512
fe959792dd77b4d31b89833b6b08901c618c8d3cbbade2ec9f35c81d728fe9c03de0e9aecbe5116b85df65b25a0ef4b0fb6dc98c15b9f7def9be4dc2c3b735fa
-
SSDEEP
96:hy859x0P8MafaJuXbRcbeDmmYb7RZsHYJuTlkikT:F5oLSXb4eO5ZsHYJrik
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2624 2660 rundll32.exe 30 PID 2660 wrote to memory of 2624 2660 rundll32.exe 30 PID 2660 wrote to memory of 2624 2660 rundll32.exe 30 PID 2660 wrote to memory of 2624 2660 rundll32.exe 30 PID 2660 wrote to memory of 2624 2660 rundll32.exe 30 PID 2660 wrote to memory of 2624 2660 rundll32.exe 30 PID 2660 wrote to memory of 2624 2660 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e4a559ef53762be46ddaa35a4dfca32c23de74e396b060d3ed6a678022e85b51.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e4a559ef53762be46ddaa35a4dfca32c23de74e396b060d3ed6a678022e85b51.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2624
-