Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 03:05
Static task
static1
Behavioral task
behavioral1
Sample
5a964dfe093c65a42c071bf58a2ad5d51efbf9fcd0269e861cfc858058281921.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5a964dfe093c65a42c071bf58a2ad5d51efbf9fcd0269e861cfc858058281921.dll
Resource
win10v2004-20240802-en
General
-
Target
5a964dfe093c65a42c071bf58a2ad5d51efbf9fcd0269e861cfc858058281921.dll
-
Size
20KB
-
MD5
6c8b720f23befb450c4bade49c2f3863
-
SHA1
cfb4b59f3bdfb786f7cdf093df59b20e470183a4
-
SHA256
5a964dfe093c65a42c071bf58a2ad5d51efbf9fcd0269e861cfc858058281921
-
SHA512
18666cf17617bf7ce3844e43c33fb64cb685547a52724e7ca3bc9cedadad0662d97644a4564e37005ecda4086fa50a6ccb0ce669e4532b9993a82d9ea71a2d42
-
SSDEEP
384:3ewsK+Hjv4Re3b6/KQMpRnlwGTjKSE6tKvMNj6WC:cr7znlwtksW3C
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2272 wrote to memory of 892 2272 rundll32.exe 30 PID 2272 wrote to memory of 892 2272 rundll32.exe 30 PID 2272 wrote to memory of 892 2272 rundll32.exe 30 PID 2272 wrote to memory of 892 2272 rundll32.exe 30 PID 2272 wrote to memory of 892 2272 rundll32.exe 30 PID 2272 wrote to memory of 892 2272 rundll32.exe 30 PID 2272 wrote to memory of 892 2272 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5a964dfe093c65a42c071bf58a2ad5d51efbf9fcd0269e861cfc858058281921.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5a964dfe093c65a42c071bf58a2ad5d51efbf9fcd0269e861cfc858058281921.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:892
-