Resubmissions
28/08/2024, 05:45
240828-gfzwfsyfpl 1011/03/2024, 16:38
240311-t5j8hsfe8v 1011/03/2024, 16:32
240311-t11dyabd98 10Analysis
-
max time kernel
66s -
max time network
71s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
28/08/2024, 05:45
Behavioral task
behavioral1
Sample
IESecurity.dll
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
ProcMon.dll
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
SpySheriff.exe
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
Uninstall.exe
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
heur000.dll
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
heur001.dll
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
heur002.dll
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
heur003.dll
Resource
win11-20240802-en
General
-
Target
heur000.dll
-
Size
124KB
-
MD5
ca4822789da674e2ae4658ee4250adb5
-
SHA1
58c3f3f15781cd775ce485f5c4d392b31bdbbe10
-
SHA256
16e8d6dc3e1c3562f8f7e98d492c152965fc08d7cc57e3846e35de11af49092e
-
SHA512
7022c63c100acc1cd2083f051ce37baa8a8e1dd1fad7c76e0ff90e05fc1c59356f9e2ae09402ca4f91bafece0c9ee52af804c52f05e6453d42bf3816542a61d7
-
SSDEEP
3072:prQm5MC1bRoAwOSxoPMVsf0nQla8vxgs2N+r3rk:Km53RRgPvSCsDr3r
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4536 wrote to memory of 1944 4536 rundll32.exe 81 PID 4536 wrote to memory of 1944 4536 rundll32.exe 81 PID 4536 wrote to memory of 1944 4536 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\heur000.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\heur000.dll,#12⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1944
-