Analysis
-
max time kernel
1s -
max time network
6s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-08-2024 10:58
Behavioral task
behavioral1
Sample
utils/x360ce/xinput1_3.dll
Resource
win7-20240704-en
windows7-x64
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
utils/x360ce/xinput1_3.dll
Resource
win10v2004-20240802-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
utils/x360ce/xinput1_3.dll
-
Size
123KB
-
MD5
5236623449893c0e1e98fc95f067fcff
-
SHA1
50b4f1e2340b7c7ad065b2111fc075b2cafe6231
-
SHA256
301f0d831d95bb5c3b5c57f8a92a35211531b410fcf2bd08927a286b867142a3
-
SHA512
9b94bddcb5e64bbf3649567f16a828588423873b60858d45c40155f36cc7f95d205f4e9b6cdc8ac2852240fdb6a67d0940c60e4f103cecbf118eae1438019c0c
-
SSDEEP
3072:989ldQHCjgnXBwyoi8MEpjhttvfqXNkMJWVaQlH:WTLvp9ttviXNk3
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid Process procid_target PID 4696 wrote to memory of 4332 4696 rundll32.exe 86 PID 4696 wrote to memory of 4332 4696 rundll32.exe 86 PID 4696 wrote to memory of 4332 4696 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\utils\x360ce\xinput1_3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\utils\x360ce\xinput1_3.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4332
-