Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 17:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
484227c1c7cd1beeb9d5cd71f6360420N.dll
Resource
win7-20240704-en
2 signatures
120 seconds
Behavioral task
behavioral2
Sample
484227c1c7cd1beeb9d5cd71f6360420N.dll
Resource
win10v2004-20240802-en
2 signatures
120 seconds
General
-
Target
484227c1c7cd1beeb9d5cd71f6360420N.dll
-
Size
4KB
-
MD5
484227c1c7cd1beeb9d5cd71f6360420
-
SHA1
92873280ac80734612bfe5c1dcb9ce1815c6dcac
-
SHA256
3a21a8a24a26aa01b9ea00523617a731fd34180ede2f809158ee294f8f74b0f1
-
SHA512
e720cea5564ef8c1de3c305a2ad44fdd77bd89cbfd31ec041e287ca6d1f562190a40419ab9395a0bb36d7e1c6447e9e24e27d4e6c355da7e3f15d3bfe7aa5035
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2712 2136 rundll32.exe 31 PID 2136 wrote to memory of 2712 2136 rundll32.exe 31 PID 2136 wrote to memory of 2712 2136 rundll32.exe 31 PID 2136 wrote to memory of 2712 2136 rundll32.exe 31 PID 2136 wrote to memory of 2712 2136 rundll32.exe 31 PID 2136 wrote to memory of 2712 2136 rundll32.exe 31 PID 2136 wrote to memory of 2712 2136 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\484227c1c7cd1beeb9d5cd71f6360420N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\484227c1c7cd1beeb9d5cd71f6360420N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2712
-