Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 06:45
Behavioral task
behavioral1
Sample
clip64.dll
Resource
win7-20240705-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
clip64.dll
Resource
win10v2004-20240802-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
clip64.dll
-
Size
127KB
-
MD5
babfda6375b07d76f6a46af11bdc3787
-
SHA1
0cd82432e87efc88a1bb17c29231f6d09f4110e9
-
SHA256
11b87c0ad7c06050d3af24d73aed0b01c1839264243cb29b992b06ded124d9ea
-
SHA512
a1df0624a4302f04586c22efcbcedbb77a69edd55f3298c3ef9b880ed16ce1f6d728be2246a11c295b76d412c06e3a6ede9d69db0e3ddcf463b9f42174512d5a
-
SSDEEP
3072:FDrG/eLj+t+YpqUjWouVPkrH3/U9acw62xm4+5j:5aeL6g2jfuVPqxA5j
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1996 1712 rundll32.exe 29 PID 1712 wrote to memory of 1996 1712 rundll32.exe 29 PID 1712 wrote to memory of 1996 1712 rundll32.exe 29 PID 1712 wrote to memory of 1996 1712 rundll32.exe 29 PID 1712 wrote to memory of 1996 1712 rundll32.exe 29 PID 1712 wrote to memory of 1996 1712 rundll32.exe 29 PID 1712 wrote to memory of 1996 1712 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\clip64.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\clip64.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1996
-