Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-08-2024 03:51
Static task
static1
Behavioral task
behavioral1
Sample
Payment Advice____xlsx.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Payment Advice____xlsx.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
vynl0gnzsf.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
vynl0gnzsf.dll
Resource
win10v2004-20240802-en
General
-
Target
vynl0gnzsf.dll
-
Size
17KB
-
MD5
9d511fba89bde65b4e28210b010c9d77
-
SHA1
cc46b5a117ca777a723422e9c68838f8e675598f
-
SHA256
3687fab11f377acc4d63b693a02ab21d14c22911f289b3ad8b19011400adc758
-
SHA512
fae30a137f093179716b780fce6ecb952abdaeeebc63745ae2cf5bd553203a252cfa5edd1c91bc31b2813dd3124c7282ae7ae706583a5bef1952cf78bcee29bb
-
SSDEEP
384:thEXpyZyASk87Xbl3JZcQ1Dq0V6xExZDGw2fLUQRGFEjpVE:H6szSDXbvZcQlqqnGw2grEj
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1080 rundll32.exe 1080 rundll32.exe 1080 rundll32.exe 1080 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1756 wrote to memory of 1080 1756 rundll32.exe 30 PID 1756 wrote to memory of 1080 1756 rundll32.exe 30 PID 1756 wrote to memory of 1080 1756 rundll32.exe 30 PID 1756 wrote to memory of 1080 1756 rundll32.exe 30 PID 1756 wrote to memory of 1080 1756 rundll32.exe 30 PID 1756 wrote to memory of 1080 1756 rundll32.exe 30 PID 1756 wrote to memory of 1080 1756 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\vynl0gnzsf.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\vynl0gnzsf.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1080
-