Analysis
-
max time kernel
90s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 01:30
Static task
static1
Behavioral task
behavioral1
Sample
d3dx9_43.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3dx9_43.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
scr_previw.exe
Resource
win7-20240903-en
General
-
Target
d3dx9_43.dll
-
Size
1.9MB
-
MD5
46e435aecb557fcb16ae2ea3b22ab7fd
-
SHA1
5290156599fd9575c4401c80949ad5672fe64da5
-
SHA256
70e0b720bb461503acbd947a8355fb629d703b8d7f99ddfbb09a0c71886861da
-
SHA512
621010aa44868062361c6dbb670f8664c370ddcb0afbb5835765470522c03bb5ac779e86236cfffdcf343cbc582f81beacd2a7108d78c90d4dfc4c38e7d23bb3
-
SSDEEP
24576:EUtU6OIyl2Wy9M3bJ45fPS0zFZghQ6aOiFaKOE31GrvFXl74YZ29X1MDd6olmrBb:E566l2u45BiNYFrz31Cv3D29kd6k9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1528 wrote to memory of 4324 1528 rundll32.exe 83 PID 1528 wrote to memory of 4324 1528 rundll32.exe 83 PID 1528 wrote to memory of 4324 1528 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d3dx9_43.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d3dx9_43.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4324
-