Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 00:42
Static task
static1
Behavioral task
behavioral1
Sample
d220bad912479a333f80c833c9912b30N.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
d220bad912479a333f80c833c9912b30N.dll
Resource
win10v2004-20240802-en
General
-
Target
d220bad912479a333f80c833c9912b30N.dll
-
Size
6KB
-
MD5
d220bad912479a333f80c833c9912b30
-
SHA1
5f62159273f49ff0f0abf5060ae2c3defd4cb4f5
-
SHA256
28f5add2a52e6a99250bf395e16f1b2ec7385da04af5f6d1e963abdf8525f04a
-
SHA512
047d2b1d9951bb57da91be414274b5af26e6619648ee1b4a7c3e63c2e7f7a9d91ebaa6c0d694d861129e7365b82646f82c94425e6603c984ff475f357e3f1f74
-
SSDEEP
96:nEY2RrF1eqwi4nWDHM+q9rGqup3uEzuzW5inn:EHRh1eppWDHM+GEzuy5G
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2176 2708 rundll32.exe 30 PID 2708 wrote to memory of 2176 2708 rundll32.exe 30 PID 2708 wrote to memory of 2176 2708 rundll32.exe 30 PID 2708 wrote to memory of 2176 2708 rundll32.exe 30 PID 2708 wrote to memory of 2176 2708 rundll32.exe 30 PID 2708 wrote to memory of 2176 2708 rundll32.exe 30 PID 2708 wrote to memory of 2176 2708 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d220bad912479a333f80c833c9912b30N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d220bad912479a333f80c833c9912b30N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2176
-