Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 10:50
Static task
static1
Behavioral task
behavioral1
Sample
dab223dd5788f24fb05df5a751a48cb0N.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
dab223dd5788f24fb05df5a751a48cb0N.dll
Resource
win10v2004-20240802-en
General
-
Target
dab223dd5788f24fb05df5a751a48cb0N.dll
-
Size
74KB
-
MD5
dab223dd5788f24fb05df5a751a48cb0
-
SHA1
2e5f6790198165b1b49151f43e405309e0c87092
-
SHA256
1508b3f8fe65fc78bdb3bcfa129081a4ec20b146da18f0b1e7a830a431f5e582
-
SHA512
c12ae1144c52617a7c846e3af410364f1b5d173b658f39f1df72d088374b7dc5c69ea5e1688c8633b84d1a200a8dc29406cf7e98239ae229bcd2e4b7b60891a0
-
SSDEEP
1536:IokvLFF/n1FcSPZuYw601UQR27YZf4dq3b:I9vBFzcStkUQR27YZf403b
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2276 wrote to memory of 1948 2276 rundll32.exe 30 PID 2276 wrote to memory of 1948 2276 rundll32.exe 30 PID 2276 wrote to memory of 1948 2276 rundll32.exe 30 PID 2276 wrote to memory of 1948 2276 rundll32.exe 30 PID 2276 wrote to memory of 1948 2276 rundll32.exe 30 PID 2276 wrote to memory of 1948 2276 rundll32.exe 30 PID 2276 wrote to memory of 1948 2276 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dab223dd5788f24fb05df5a751a48cb0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dab223dd5788f24fb05df5a751a48cb0N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1948
-