Analysis
-
max time kernel
94s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2024 23:27
Static task
static1
Behavioral task
behavioral1
Sample
7c7f83aaa6c05db68970559a466ab0c6cae6b01d318a4faea393346da3ae0ce3.dll
Resource
win7-20240708-en
General
-
Target
7c7f83aaa6c05db68970559a466ab0c6cae6b01d318a4faea393346da3ae0ce3.dll
-
Size
818KB
-
MD5
22f56aaf8267941c0b8523c9b2ae898b
-
SHA1
255d3226910d61a5b79e03f0d389c6b20cdff2a4
-
SHA256
7c7f83aaa6c05db68970559a466ab0c6cae6b01d318a4faea393346da3ae0ce3
-
SHA512
7cb3056d951341f2f869c1cfe191abbda2c324c39e749035ca3b3eecac0af843a31d29e4f83a82073c80bee0b97bf194276a11538dbd0f83dc70f5f35f36fe1e
-
SSDEEP
6144:o6C5AXbMn7UI1FoV2gwTBlrIckPJYYYYYYYYYYYYo:o6RI1Fo/wT3cJYYYYYYYYYYYYo
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4824 wrote to memory of 2856 4824 rundll32.exe rundll32.exe PID 4824 wrote to memory of 2856 4824 rundll32.exe rundll32.exe PID 4824 wrote to memory of 2856 4824 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7c7f83aaa6c05db68970559a466ab0c6cae6b01d318a4faea393346da3ae0ce3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7c7f83aaa6c05db68970559a466ab0c6cae6b01d318a4faea393346da3ae0ce3.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2856