Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-09-2024 12:39
Static task
static1
Behavioral task
behavioral1
Sample
6300af862b4d7f4099c30e81213a61528a2ef06c016e4f91bbafd72624c1dbb7.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6300af862b4d7f4099c30e81213a61528a2ef06c016e4f91bbafd72624c1dbb7.dll
Resource
win10v2004-20240802-en
General
-
Target
6300af862b4d7f4099c30e81213a61528a2ef06c016e4f91bbafd72624c1dbb7.dll
-
Size
131KB
-
MD5
932316c66fa823d6470e78f72161fd9b
-
SHA1
98100ca9f1a65b26e58c3c2a43d10dfa538d5496
-
SHA256
6300af862b4d7f4099c30e81213a61528a2ef06c016e4f91bbafd72624c1dbb7
-
SHA512
83eb550d63fd5cd1fa24eeb90d1c89b0f822192fedc9789c37116da7c62e6a179958a95c28b387cfcf69ab78ba83bd04da0064264b5bb61c03a1841f81ca7a2a
-
SSDEEP
3072:m3ftG/BrVeADJlt/0BkdgXPDrjrOUORF7zF+lh2Zbr4SPQg:QftG/Bvft/06+//j9H2ZgSPQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1928 wrote to memory of 2068 1928 rundll32.exe 31 PID 1928 wrote to memory of 2068 1928 rundll32.exe 31 PID 1928 wrote to memory of 2068 1928 rundll32.exe 31 PID 1928 wrote to memory of 2068 1928 rundll32.exe 31 PID 1928 wrote to memory of 2068 1928 rundll32.exe 31 PID 1928 wrote to memory of 2068 1928 rundll32.exe 31 PID 1928 wrote to memory of 2068 1928 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6300af862b4d7f4099c30e81213a61528a2ef06c016e4f91bbafd72624c1dbb7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6300af862b4d7f4099c30e81213a61528a2ef06c016e4f91bbafd72624c1dbb7.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2068
-