Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09-08-2024 10:55
Static task
static1
Behavioral task
behavioral1
Sample
a3743f0000abf13427cd1ce6e39c7d4caa3af46a5d2829a49707d27e75ae30de.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a3743f0000abf13427cd1ce6e39c7d4caa3af46a5d2829a49707d27e75ae30de.dll
Resource
win10v2004-20240802-en
General
-
Target
a3743f0000abf13427cd1ce6e39c7d4caa3af46a5d2829a49707d27e75ae30de.dll
-
Size
51KB
-
MD5
7290ccd333a387bf9f8ecef0be2a811c
-
SHA1
1015eff143150b7e61fd226aa91a60cb205ebb66
-
SHA256
a3743f0000abf13427cd1ce6e39c7d4caa3af46a5d2829a49707d27e75ae30de
-
SHA512
9d23fef8a1c20c9b4301ccac9da4e9328e8ae656c25493eb1722851caf8984fcb014ea7e61b988edbafc4248cdaf0d4a7d88df3c5a69f4b7d2e034af5172fbb6
-
SSDEEP
768:3Er7XR1M6t6FikUE58ozVOB+6QcXn0cE5Y18BtrEZJjuSkwFOBezVsAMC6Hh4:3EXXM2HEhzVWKtrEZFxFOBSpMC6H
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2560 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1528 wrote to memory of 2560 1528 rundll32.exe 30 PID 1528 wrote to memory of 2560 1528 rundll32.exe 30 PID 1528 wrote to memory of 2560 1528 rundll32.exe 30 PID 1528 wrote to memory of 2560 1528 rundll32.exe 30 PID 1528 wrote to memory of 2560 1528 rundll32.exe 30 PID 1528 wrote to memory of 2560 1528 rundll32.exe 30 PID 1528 wrote to memory of 2560 1528 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a3743f0000abf13427cd1ce6e39c7d4caa3af46a5d2829a49707d27e75ae30de.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a3743f0000abf13427cd1ce6e39c7d4caa3af46a5d2829a49707d27e75ae30de.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2560
-