Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 17:11
Behavioral task
behavioral1
Sample
8f25f43285f489ab47ff051300b2ca80N.dll
Resource
win7-20240708-en
3 signatures
120 seconds
General
-
Target
8f25f43285f489ab47ff051300b2ca80N.dll
-
Size
784KB
-
MD5
8f25f43285f489ab47ff051300b2ca80
-
SHA1
387cd1caff8cb08a7e83dd164d38582dd7481d2b
-
SHA256
c9fe224fc4e8dd79d0a89de31c79db06fb413f1932a0908875c08d5c9a64f8a7
-
SHA512
eef4f023f4cbb994d0bde50439aeaea922971c03c0e2741607ee00f62d5937b44b744bba566d64057dc47d425134ffb83e081e0d099cc7843162f5e2edda14d0
-
SSDEEP
24576:1A2oHm3zxXJs8AV/FWftMtvRH/hB4WhRmL:UHmDxXJfm/otMtvd/74Wb
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3736-0-0x0000000000400000-0x00000000005CB000-memory.dmp vmprotect behavioral2/memory/3736-1-0x0000000000400000-0x00000000005CB000-memory.dmp vmprotect behavioral2/memory/3736-3-0x0000000000400000-0x00000000005CB000-memory.dmp vmprotect -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2388 wrote to memory of 3736 2388 rundll32.exe 91 PID 2388 wrote to memory of 3736 2388 rundll32.exe 91 PID 2388 wrote to memory of 3736 2388 rundll32.exe 91
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8f25f43285f489ab47ff051300b2ca80N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8f25f43285f489ab47ff051300b2ca80N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4464,i,8231329449558834090,4540802069600791165,262144 --variations-seed-version --mojo-platform-channel-handle=4028 /prefetch:81⤵PID:4816