Analysis
-
max time kernel
130s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 02:15
Static task
static1
Behavioral task
behavioral1
Sample
861911e953e6fd0a015b3a91a7528a388a535c83f4b9a5cf7366b8209d2f00c3.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
861911e953e6fd0a015b3a91a7528a388a535c83f4b9a5cf7366b8209d2f00c3.dll
Resource
win10v2004-20240802-en
General
-
Target
861911e953e6fd0a015b3a91a7528a388a535c83f4b9a5cf7366b8209d2f00c3.dll
-
Size
144KB
-
MD5
b14ef85a60ac71c669cc960bdf580144
-
SHA1
08906644b0ef1ee6478c45a6e0dd28533a9efc29
-
SHA256
861911e953e6fd0a015b3a91a7528a388a535c83f4b9a5cf7366b8209d2f00c3
-
SHA512
568fd5856c2e3801d59d094429243b6e1649d3b519f8cad0feab2c6752d4158e30d305fe06a651788d7f4420d43886f5dfb4fb43da605f0a718711cb099059e9
-
SSDEEP
3072:X3ri+nr4ciRGSuaHUCO25obTBhH5P1KCJN6hkf1GYn3:X3rv2RGPwUC5o3H5PVLln3
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 18 3856 rundll32.exe 19 1860 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1860 rundll32.exe 3856 rundll32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4796 wrote to memory of 4892 4796 rundll32.exe 86 PID 4796 wrote to memory of 4892 4796 rundll32.exe 86 PID 4796 wrote to memory of 4892 4796 rundll32.exe 86 PID 4892 wrote to memory of 1860 4892 rundll32.exe 87 PID 4892 wrote to memory of 1860 4892 rundll32.exe 87 PID 4892 wrote to memory of 1860 4892 rundll32.exe 87 PID 4892 wrote to memory of 3856 4892 rundll32.exe 93 PID 4892 wrote to memory of 3856 4892 rundll32.exe 93 PID 4892 wrote to memory of 3856 4892 rundll32.exe 93
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\861911e953e6fd0a015b3a91a7528a388a535c83f4b9a5cf7366b8209d2f00c3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\861911e953e6fd0a015b3a91a7528a388a535c83f4b9a5cf7366b8209d2f00c3.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen https://rammenale.com/for2/aclog.txt3⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:1860
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen https://rammenale.com/for2/regit.tmp3⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:3856
-
-