Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 04:09
Static task
static1
Behavioral task
behavioral1
Sample
f2ff4bc5a3d5dba3a744e8b5a1d1ab3a306bcc5c08541557c66c6059f4fc4e65.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f2ff4bc5a3d5dba3a744e8b5a1d1ab3a306bcc5c08541557c66c6059f4fc4e65.dll
Resource
win10v2004-20240802-en
General
-
Target
f2ff4bc5a3d5dba3a744e8b5a1d1ab3a306bcc5c08541557c66c6059f4fc4e65.dll
-
Size
601KB
-
MD5
1d430d3d8006669e3f8c7ad01a8b3ccd
-
SHA1
bc5d294ec0e7053601e77ed19ea53075b753c143
-
SHA256
f2ff4bc5a3d5dba3a744e8b5a1d1ab3a306bcc5c08541557c66c6059f4fc4e65
-
SHA512
8d419a3e14941fb8d8cd1a0f5a02a1645771966e80647efc57b6c9c1b6e34388a77b2419b66c823d5d62ce66e4be64d02b3d56e26b7af60405e48a72d9633b50
-
SSDEEP
12288:eXw6owecGrCcv8NIxZSuKEzNnnTjeHRrDk1VbaKiavG:eglutcEax4ut5n/eHRrDrav
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1952 wrote to memory of 1032 1952 rundll32.exe 30 PID 1952 wrote to memory of 1032 1952 rundll32.exe 30 PID 1952 wrote to memory of 1032 1952 rundll32.exe 30 PID 1952 wrote to memory of 1032 1952 rundll32.exe 30 PID 1952 wrote to memory of 1032 1952 rundll32.exe 30 PID 1952 wrote to memory of 1032 1952 rundll32.exe 30 PID 1952 wrote to memory of 1032 1952 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f2ff4bc5a3d5dba3a744e8b5a1d1ab3a306bcc5c08541557c66c6059f4fc4e65.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f2ff4bc5a3d5dba3a744e8b5a1d1ab3a306bcc5c08541557c66c6059f4fc4e65.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1032
-