Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09-08-2024 02:54
Static task
static1
Behavioral task
behavioral1
Sample
d647404f506cd98d620afc6d8225976be02432d1cc31af31b0cc300f2b4e2fc2.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d647404f506cd98d620afc6d8225976be02432d1cc31af31b0cc300f2b4e2fc2.dll
Resource
win10v2004-20240802-en
General
-
Target
d647404f506cd98d620afc6d8225976be02432d1cc31af31b0cc300f2b4e2fc2.dll
-
Size
6KB
-
MD5
e426cf2755084ac61654737d590de80f
-
SHA1
29ed19b0ef54f91919530da3097202eb558f3f02
-
SHA256
d647404f506cd98d620afc6d8225976be02432d1cc31af31b0cc300f2b4e2fc2
-
SHA512
5efbe698ab7c36c2fa303401e37119ecb6e4d9c72adbbe84fcc087f967d169aef73c96d9d717a4669098f1446ba3739d3010b6a1f2e53f0f0ba53fd61e8d4207
-
SSDEEP
48:6EQt5YVOSVVEPy+wEMmqiHNpU10SB+BDq9J5SV3DY:CSVVEPozmB7wB+FqX5S1D
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2944 2884 rundll32.exe 30 PID 2884 wrote to memory of 2944 2884 rundll32.exe 30 PID 2884 wrote to memory of 2944 2884 rundll32.exe 30 PID 2884 wrote to memory of 2944 2884 rundll32.exe 30 PID 2884 wrote to memory of 2944 2884 rundll32.exe 30 PID 2884 wrote to memory of 2944 2884 rundll32.exe 30 PID 2884 wrote to memory of 2944 2884 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d647404f506cd98d620afc6d8225976be02432d1cc31af31b0cc300f2b4e2fc2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d647404f506cd98d620afc6d8225976be02432d1cc31af31b0cc300f2b4e2fc2.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2944
-