Analysis
-
max time kernel
19s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 17:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
759082c0631e1ba2078a3b85501565a0N.dll
Resource
win7-20240708-en
windows7-x64
3 signatures
120 seconds
General
-
Target
759082c0631e1ba2078a3b85501565a0N.dll
-
Size
1.1MB
-
MD5
759082c0631e1ba2078a3b85501565a0
-
SHA1
86dfa5c7a5d5e3e4257d36ec0a925c7944fda024
-
SHA256
fbc0fe4b72f946aa65e886a445205ed9f553e32b658bb91020e42f83573f7d30
-
SHA512
e6c373581b4e50fa0cc48a36cb38ffd05b7a8f7210e2c16185d7e7a1a60da405b9d4e18bc8cbaed61948b1b0ae14685ccc18a2c797970bf05eaa35828cb30677
-
SSDEEP
12288:jDgN6MoIwT3qOOOOOOOOOOOOOOOOOOOOOOU:jTtT3qOOOOOOOOOOOOOOOOOOOOOOU
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1716 wrote to memory of 824 1716 rundll32.exe 28 PID 1716 wrote to memory of 824 1716 rundll32.exe 28 PID 1716 wrote to memory of 824 1716 rundll32.exe 28 PID 1716 wrote to memory of 824 1716 rundll32.exe 28 PID 1716 wrote to memory of 824 1716 rundll32.exe 28 PID 1716 wrote to memory of 824 1716 rundll32.exe 28 PID 1716 wrote to memory of 824 1716 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\759082c0631e1ba2078a3b85501565a0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\759082c0631e1ba2078a3b85501565a0N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:824
-