Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 07:12
Behavioral task
behavioral1
Sample
50a55e1c4cbf144aab02ccc62b1edd118d8189e878fa8c7e0042584093483879.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
50a55e1c4cbf144aab02ccc62b1edd118d8189e878fa8c7e0042584093483879.dll
Resource
win10v2004-20240802-en
General
-
Target
50a55e1c4cbf144aab02ccc62b1edd118d8189e878fa8c7e0042584093483879.dll
-
Size
1.2MB
-
MD5
c3d857ce631028020ef3503dcdfdbd46
-
SHA1
d6adb4d164924eceeced000bca71ab1d1aaa8886
-
SHA256
50a55e1c4cbf144aab02ccc62b1edd118d8189e878fa8c7e0042584093483879
-
SHA512
d89a5da64f9926cae70b10859024979a17c9aa1b4d47095d526384c1c0e084356bdc06ad44cf44e63f2a725b29dda4ba52b2134d7478203981f68b5fc9c37e5f
-
SSDEEP
24576:JPMVj2SBKlmiknmi+EjuAKGpZlAM5WbUg/n3MtRAaoSFOtTIqwK0b6dc:FQD7ATIoc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2760 2692 rundll32.exe 30 PID 2692 wrote to memory of 2760 2692 rundll32.exe 30 PID 2692 wrote to memory of 2760 2692 rundll32.exe 30 PID 2692 wrote to memory of 2760 2692 rundll32.exe 30 PID 2692 wrote to memory of 2760 2692 rundll32.exe 30 PID 2692 wrote to memory of 2760 2692 rundll32.exe 30 PID 2692 wrote to memory of 2760 2692 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\50a55e1c4cbf144aab02ccc62b1edd118d8189e878fa8c7e0042584093483879.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\50a55e1c4cbf144aab02ccc62b1edd118d8189e878fa8c7e0042584093483879.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2760
-