Resubmissions
25-08-2024 09:52
240825-lwb7jsxgmh 1022-08-2024 07:27
240822-h98wwsvdrh 1022-08-2024 07:21
240822-h651tsxhrk 1021-08-2024 20:21
240821-y44b8aydje 10Analysis
-
max time kernel
77s -
max time network
79s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
22-08-2024 07:27
Behavioral task
behavioral1
Sample
libssp-0.dll
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
pidgin.exe
Resource
win10-20240611-en
Behavioral task
behavioral3
Sample
sqlite3.dll
Resource
win10-20240404-en
General
-
Target
libssp-0.dll
-
Size
88KB
-
MD5
1f521e8b258d2b09f66fb8c940452b72
-
SHA1
7d669fe4108d40ed431a6728a27a2efc5c153bd0
-
SHA256
7786e9e3c7fe54f52b54e4bb922ef569ad68dc14f4096d530824556975e0f462
-
SHA512
61058ec95c20ff46f3613f3bd7647231943b64f8171eb0327ee72613a079bd9d8e639434208bb120b1d5242075a13be6686c0dfd31c04932a93f1bef413192d3
-
SSDEEP
1536:+wzc7A4bn7UPoru9A6KKsmD2LNEVYxi485/xchTF/fBcA7Oola9:Jc0on7UPoru93VrD2ZqYxi485ZcvniAm
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2084 wrote to memory of 3952 2084 rundll32.exe 73 PID 2084 wrote to memory of 3952 2084 rundll32.exe 73 PID 2084 wrote to memory of 3952 2084 rundll32.exe 73
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\libssp-0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\libssp-0.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3952
-