Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/09/2024, 01:39
Static task
static1
Behavioral task
behavioral1
Sample
a4151c4ffe1066e2c648d9cae883dc69e1c1aa69de3c4317681b08b9fbee8197.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a4151c4ffe1066e2c648d9cae883dc69e1c1aa69de3c4317681b08b9fbee8197.dll
Resource
win10v2004-20240802-en
General
-
Target
a4151c4ffe1066e2c648d9cae883dc69e1c1aa69de3c4317681b08b9fbee8197.dll
-
Size
7KB
-
MD5
74b64247e1733eeddd10fa4a568cc408
-
SHA1
0835c8f78b871802011af529160c7379595353f1
-
SHA256
a4151c4ffe1066e2c648d9cae883dc69e1c1aa69de3c4317681b08b9fbee8197
-
SHA512
c03e1e625a43479bbdc55565aaac375fce45a724a085ef3db9b78a1de3c99a2f1fdaae17a2865e54f1824a690b91d3db70a14d1b6461d023f058ffaa885b53c5
-
SSDEEP
96:DixZjmjtjd8jPjcZGR5TIqspSy7+uNHjPlK/xCTqg+:unSR6bgY+pNKuxDlK6qh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2972 3052 rundll32.exe 30 PID 3052 wrote to memory of 2972 3052 rundll32.exe 30 PID 3052 wrote to memory of 2972 3052 rundll32.exe 30 PID 3052 wrote to memory of 2972 3052 rundll32.exe 30 PID 3052 wrote to memory of 2972 3052 rundll32.exe 30 PID 3052 wrote to memory of 2972 3052 rundll32.exe 30 PID 3052 wrote to memory of 2972 3052 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a4151c4ffe1066e2c648d9cae883dc69e1c1aa69de3c4317681b08b9fbee8197.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a4151c4ffe1066e2c648d9cae883dc69e1c1aa69de3c4317681b08b9fbee8197.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2972
-