Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-09-2024 20:01
Behavioral task
behavioral1
Sample
dc8d4123f4feecffc630054c597fb4f0N.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
dc8d4123f4feecffc630054c597fb4f0N.dll
Resource
win10v2004-20240802-en
General
-
Target
dc8d4123f4feecffc630054c597fb4f0N.dll
-
Size
753KB
-
MD5
dc8d4123f4feecffc630054c597fb4f0
-
SHA1
77f2e1a6167257f6767e33bf3178674f93da5823
-
SHA256
e5e61cf144f84ab9906fc69b2d1bac51ae3ce9e250e6db880da8a4dde13d1721
-
SHA512
9c7699747bd4b440bd4910b150bd08a620697a046e06726529b829655e71a64c20780a1c146b117efc10f99a80ffb82837b45815a9c89fef8bf11b5ebdf0db70
-
SSDEEP
12288:1oMAwOrWpIRg8c9vYMEWIL6JVyfvrJlOXifG2JYkXCAA4DtdFXIq6xGJOpqUbHly:1TOrY88YMVCTGvFkXpDtdP0GkpHjl5Jy
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 30 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A15855AC-CF0D-48C2-6DAB-1B63AC15E293}\ProgID\ = "Msxml2.DOMDocument.3.0" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A9497DA5-E59D-1C81-48A0-A4666EF029D9}\1.0\0\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A9497DA5-E59D-1C81-48A0-A4666EF029D9}\1.0\0\win32\ = "C:\\Windows\\SysWOW64\\sppcomapi.dll" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A15855AC-CF0D-48C2-6DAB-1B63AC15E293}\TypeLib\ = "{A9497DA5-E59D-1C81-48A0-A4666EF029D9}" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A15855AC-CF0D-48C2-6DAB-1B63AC15E293}\Version\ rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A15855AC-CF0D-48C2-6DAB-1B63AC15E293} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A9497DA5-E59D-1C81-48A0-A4666EF029D9} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A15855AC-CF0D-48C2-6DAB-1B63AC15E293}\VersionIndependentProgID rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A15855AC-CF0D-48C2-6DAB-1B63AC15E293}\ = "Ocanapop" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A15855AC-CF0D-48C2-6DAB-1B63AC15E293}\InProcServer32\ rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A9497DA5-E59D-1C81-48A0-A4666EF029D9}\1.0 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A9497DA5-E59D-1C81-48A0-A4666EF029D9}\1.0\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A9497DA5-E59D-1C81-48A0-A4666EF029D9}\1.0\0\win32\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A9497DA5-E59D-1C81-48A0-A4666EF029D9}\1.0\0\win64\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A15855AC-CF0D-48C2-6DAB-1B63AC15E293}\ProgID\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A15855AC-CF0D-48C2-6DAB-1B63AC15E293}\Version\ = "3.0" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A15855AC-CF0D-48C2-6DAB-1B63AC15E293}\InProcServer32\ = "%SystemRoot%\\SysWow64\\msxml3.dll" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A9497DA5-E59D-1C81-48A0-A4666EF029D9}\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A9497DA5-E59D-1C81-48A0-A4666EF029D9}\1.0\ = "SPPComApiLib 1.0 Type Library" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A9497DA5-E59D-1C81-48A0-A4666EF029D9}\1.0\0\win64 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A9497DA5-E59D-1C81-48A0-A4666EF029D9}\1.0\0\win64\ = "C:\\Windows\\SysWow64\\sppcomapi.dll" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A15855AC-CF0D-48C2-6DAB-1B63AC15E293}\Version rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A15855AC-CF0D-48C2-6DAB-1B63AC15E293}\TypeLib\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A15855AC-CF0D-48C2-6DAB-1B63AC15E293}\VersionIndependentProgID\ rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A15855AC-CF0D-48C2-6DAB-1B63AC15E293}\InProcServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A15855AC-CF0D-48C2-6DAB-1B63AC15E293}\ProgID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A9497DA5-E59D-1C81-48A0-A4666EF029D9}\1.0\0 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A9497DA5-E59D-1C81-48A0-A4666EF029D9}\1.0\0\win32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A15855AC-CF0D-48C2-6DAB-1B63AC15E293}\TypeLib rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A15855AC-CF0D-48C2-6DAB-1B63AC15E293}\VersionIndependentProgID\ = "Msxml2.DOMDocument" rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 700 wrote to memory of 1508 700 rundll32.exe 83 PID 700 wrote to memory of 1508 700 rundll32.exe 83 PID 700 wrote to memory of 1508 700 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dc8d4123f4feecffc630054c597fb4f0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dc8d4123f4feecffc630054c597fb4f0N.dll,#12⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1508
-