Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/09/2024, 09:07
Static task
static1
Behavioral task
behavioral1
Sample
04256d9c20ec7dd2b6410f95883a6fcdb6f1a002d4e39a3bf2bc4e621e824752.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
04256d9c20ec7dd2b6410f95883a6fcdb6f1a002d4e39a3bf2bc4e621e824752.dll
Resource
win10v2004-20240802-en
General
-
Target
04256d9c20ec7dd2b6410f95883a6fcdb6f1a002d4e39a3bf2bc4e621e824752.dll
-
Size
928KB
-
MD5
d0bdade65e1a643c275833b751f5b6fc
-
SHA1
e672d413d69f9bf17432ad19bb2db65543d71437
-
SHA256
04256d9c20ec7dd2b6410f95883a6fcdb6f1a002d4e39a3bf2bc4e621e824752
-
SHA512
af00f614d43f0baf692c705c3ff81f9746b6957c1d5c0fea20dc6769cdc0d4696b63bd3480b7553c2e3665037fb1dd190d7c649a74c6eb387aff229496f9d620
-
SSDEEP
12288:G1nw8+zn1lpgTMDBuuk7QvEekeCOtHaB9/lH7KXgqbc:G1cn1AT0BuuHv1kFbKXs
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2924 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2924 2436 rundll32.exe 29 PID 2436 wrote to memory of 2924 2436 rundll32.exe 29 PID 2436 wrote to memory of 2924 2436 rundll32.exe 29 PID 2436 wrote to memory of 2924 2436 rundll32.exe 29 PID 2436 wrote to memory of 2924 2436 rundll32.exe 29 PID 2436 wrote to memory of 2924 2436 rundll32.exe 29 PID 2436 wrote to memory of 2924 2436 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\04256d9c20ec7dd2b6410f95883a6fcdb6f1a002d4e39a3bf2bc4e621e824752.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\04256d9c20ec7dd2b6410f95883a6fcdb6f1a002d4e39a3bf2bc4e621e824752.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2924
-