Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 21:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7c6387acd6b161b8e9748bfc40f9fdc0N.dll
Resource
win7-20240708-en
2 signatures
120 seconds
Behavioral task
behavioral2
Sample
7c6387acd6b161b8e9748bfc40f9fdc0N.dll
Resource
win10v2004-20240802-en
2 signatures
120 seconds
General
-
Target
7c6387acd6b161b8e9748bfc40f9fdc0N.dll
-
Size
3KB
-
MD5
7c6387acd6b161b8e9748bfc40f9fdc0
-
SHA1
7e7705e005b08bfd13d02de8916dda0b7f966242
-
SHA256
f7c47383ba376ba5325829465b6ee2975d5375044b524f58c35f858188c40b9a
-
SHA512
2bb5eec04081221ada2eed9643dc5d1f2f5d7a9d1143a5989b6ede4470a114c0ffd7b7602ae1351ee68fdf339e97e09bd4eedcf6286b520a3024682e7e2f8889
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2252 2128 rundll32.exe 30 PID 2128 wrote to memory of 2252 2128 rundll32.exe 30 PID 2128 wrote to memory of 2252 2128 rundll32.exe 30 PID 2128 wrote to memory of 2252 2128 rundll32.exe 30 PID 2128 wrote to memory of 2252 2128 rundll32.exe 30 PID 2128 wrote to memory of 2252 2128 rundll32.exe 30 PID 2128 wrote to memory of 2252 2128 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7c6387acd6b161b8e9748bfc40f9fdc0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7c6387acd6b161b8e9748bfc40f9fdc0N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2252
-