Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/08/2024, 23:35
Behavioral task
behavioral1
Sample
b4865cdbed92d075df410d8ddbdc2d1cb2111e508b2617f9689f21ef04f67e5f.dll
Resource
win7-20240708-en
3 signatures
150 seconds
General
-
Target
b4865cdbed92d075df410d8ddbdc2d1cb2111e508b2617f9689f21ef04f67e5f.dll
-
Size
76KB
-
MD5
00e9c24d20d9dc7a272a9ebe231f8c1a
-
SHA1
e3957fe814ce3a0bd136c20ecd72f566d4f59cf7
-
SHA256
b4865cdbed92d075df410d8ddbdc2d1cb2111e508b2617f9689f21ef04f67e5f
-
SHA512
983d8092e851a71c6897377dfcbbe5cc3ffcf7aee6eb7b43b0449b213e343752f0d3bd7588a196b9f41df8f539e4efea577b93a2b8815e5887348d92b6991ba1
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZkJ6SfcD9WW:c8y93KQjy7G55riF1cMo03SJ6SfcDgW
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/764-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/764-2-0x0000000010000000-0x0000000010030000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1984 wrote to memory of 764 1984 rundll32.exe 31 PID 1984 wrote to memory of 764 1984 rundll32.exe 31 PID 1984 wrote to memory of 764 1984 rundll32.exe 31 PID 1984 wrote to memory of 764 1984 rundll32.exe 31 PID 1984 wrote to memory of 764 1984 rundll32.exe 31 PID 1984 wrote to memory of 764 1984 rundll32.exe 31 PID 1984 wrote to memory of 764 1984 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b4865cdbed92d075df410d8ddbdc2d1cb2111e508b2617f9689f21ef04f67e5f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b4865cdbed92d075df410d8ddbdc2d1cb2111e508b2617f9689f21ef04f67e5f.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:764
-