Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
14-08-2024 04:25
Static task
static1
Behavioral task
behavioral1
Sample
399349aee07b8b9b14cce3bb6221b0c0N.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
399349aee07b8b9b14cce3bb6221b0c0N.dll
Resource
win10v2004-20240802-en
General
-
Target
399349aee07b8b9b14cce3bb6221b0c0N.dll
-
Size
6KB
-
MD5
399349aee07b8b9b14cce3bb6221b0c0
-
SHA1
7e1832ef2ce87a26b68016b380e758b80dd6b58d
-
SHA256
caff36995f6b5bc00b4066bb8b407d9c78e425143d8e5745859a7404e6cc4f5b
-
SHA512
490a7e21e1af4a89e824d97a98ad97ba07921364f3bddcdc951597aff2c7e22c4a308d54a9e5dd76fbece9fad1a624f7f2ff127e94c9bc7f8bfa843e42a222e7
-
SSDEEP
48:6DOdd5YVOiFVE/y/sqwokyJyi0QB+BDq9J5S9:piFVE/y6okJUB+FqX5S9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2892 2384 rundll32.exe 30 PID 2384 wrote to memory of 2892 2384 rundll32.exe 30 PID 2384 wrote to memory of 2892 2384 rundll32.exe 30 PID 2384 wrote to memory of 2892 2384 rundll32.exe 30 PID 2384 wrote to memory of 2892 2384 rundll32.exe 30 PID 2384 wrote to memory of 2892 2384 rundll32.exe 30 PID 2384 wrote to memory of 2892 2384 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\399349aee07b8b9b14cce3bb6221b0c0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\399349aee07b8b9b14cce3bb6221b0c0N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2892
-