Overview
overview
3Static
static
3SecuriteIn...05.exe
windows7-x64
3SecuriteIn...05.exe
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$TEMP/ExCertTool.dll
windows7-x64
3$TEMP/ExCertTool.dll
windows10-2004-x64
3XSearch.exe
windows7-x64
3XSearch.exe
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-09-2024 08:26
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Heuristic.HEUR.AGEN.1361137.7797.13105.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Heuristic.HEUR.AGEN.1361137.7797.13105.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$TEMP/ExCertTool.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$TEMP/ExCertTool.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
XSearch.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
XSearch.exe
Resource
win10v2004-20240802-en
General
-
Target
$TEMP/ExCertTool.dll
-
Size
4KB
-
MD5
2bd5d302153bf0675b7ddec40aca6302
-
SHA1
7e1c08457c5e9514adc79df06cfbf2cfb368c6b3
-
SHA256
81903972afded5dd07e55950c8246cbd99b40206e6f3f20b638fe3c02cd45c54
-
SHA512
1ace75e86b5108525bbcc150a7355b98456047ee4de2daa3292804285dfa175749de2e2f65b8706c4af8843d75e9221a5ceaa48875bd1050b61e730b21c5dd5f
-
SSDEEP
48:SVFgLMs95lR5mulZSDPxJmwcialtDS4O:A+TZ7xKDPxJmSol
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\8E3BF065AD6025977FC25B37DFE962AF420C7935 rundll32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\8E3BF065AD6025977FC25B37DFE962AF420C7935\Blob = 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 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1744 wrote to memory of 2004 1744 rundll32.exe 28 PID 1744 wrote to memory of 2004 1744 rundll32.exe 28 PID 1744 wrote to memory of 2004 1744 rundll32.exe 28 PID 1744 wrote to memory of 2004 1744 rundll32.exe 28 PID 1744 wrote to memory of 2004 1744 rundll32.exe 28 PID 1744 wrote to memory of 2004 1744 rundll32.exe 28 PID 1744 wrote to memory of 2004 1744 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$TEMP\ExCertTool.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$TEMP\ExCertTool.dll,#12⤵
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:2004
-