Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-08-2024 01:13
Static task
static1
Behavioral task
behavioral1
Sample
c0d254d093c344e53011a3523c98bdbda33e41767c5285fc0a960760b7c7915e.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c0d254d093c344e53011a3523c98bdbda33e41767c5285fc0a960760b7c7915e.dll
Resource
win10v2004-20240802-en
General
-
Target
c0d254d093c344e53011a3523c98bdbda33e41767c5285fc0a960760b7c7915e.dll
-
Size
5KB
-
MD5
681dcb1d556bc44cbf7f9ded6d01f27b
-
SHA1
f7c8e456c80bbce4d27d0898e145dec42eaab1db
-
SHA256
c0d254d093c344e53011a3523c98bdbda33e41767c5285fc0a960760b7c7915e
-
SHA512
0c238db41156e1ff4dd608ad5a656316f335d1af7bf069ba665c71161a26f7eda244e329211613a7b62fe48db021a7f8e40813cb7458fcbd39ff112e2fc3f4eb
-
SSDEEP
48:CCy86+Wet9Q/iooHeiefhe+/lSMYEqvYHC+1Oo2aI47geybI7mLXuyAejT4B74e5:hy859x0P8MavL+1H20keOIyLX/f24e5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2752 wrote to memory of 2788 2752 rundll32.exe 30 PID 2752 wrote to memory of 2788 2752 rundll32.exe 30 PID 2752 wrote to memory of 2788 2752 rundll32.exe 30 PID 2752 wrote to memory of 2788 2752 rundll32.exe 30 PID 2752 wrote to memory of 2788 2752 rundll32.exe 30 PID 2752 wrote to memory of 2788 2752 rundll32.exe 30 PID 2752 wrote to memory of 2788 2752 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c0d254d093c344e53011a3523c98bdbda33e41767c5285fc0a960760b7c7915e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c0d254d093c344e53011a3523c98bdbda33e41767c5285fc0a960760b7c7915e.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2788
-