Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 09:20
Static task
static1
Behavioral task
behavioral1
Sample
b2b7e16865fff13412f82c1efafe9ea0N.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b2b7e16865fff13412f82c1efafe9ea0N.dll
Resource
win10v2004-20240802-en
General
-
Target
b2b7e16865fff13412f82c1efafe9ea0N.dll
-
Size
6KB
-
MD5
b2b7e16865fff13412f82c1efafe9ea0
-
SHA1
c54f790ff5e7f162a15818bb06313736f3ae3866
-
SHA256
ddaea24504eaf9c68aee9e02a05fb9217f1d2593c0b247d493fc297c5e7adc4b
-
SHA512
c96f4ac23d880192e2943271fda7a1e80c5df465d8849608e9de2b2ed82f56d2bfb26ffcd0f38ab038c50332f15cc6648b6743254c205e611fcc007cb2d19b36
-
SSDEEP
96:hy859x0P8MaOq/Zt/V9G1nAarkED27+b:F5oLyZt/V6nAa4D+b
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1772 wrote to memory of 2276 1772 rundll32.exe 29 PID 1772 wrote to memory of 2276 1772 rundll32.exe 29 PID 1772 wrote to memory of 2276 1772 rundll32.exe 29 PID 1772 wrote to memory of 2276 1772 rundll32.exe 29 PID 1772 wrote to memory of 2276 1772 rundll32.exe 29 PID 1772 wrote to memory of 2276 1772 rundll32.exe 29 PID 1772 wrote to memory of 2276 1772 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b2b7e16865fff13412f82c1efafe9ea0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b2b7e16865fff13412f82c1efafe9ea0N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2276
-