Analysis
-
max time kernel
94s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 17:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e093fa8ed105cdb187af1c94e2a1a9735c6026f45843f6e43212c34960164480.dll
Resource
win7-20240708-en
windows7-x64
5 signatures
150 seconds
General
-
Target
e093fa8ed105cdb187af1c94e2a1a9735c6026f45843f6e43212c34960164480.dll
-
Size
3.5MB
-
MD5
364f28204c95ca69163b8febb65d3b71
-
SHA1
10dd1297dad131afc0ee382ba92dcb34b2e2d74e
-
SHA256
e093fa8ed105cdb187af1c94e2a1a9735c6026f45843f6e43212c34960164480
-
SHA512
80fe589c80215789a46f4150f6dd06aaa7f79f9133cd9459ef89e81ddf92cc68fae2e390e4b6cef653a46ccecf037479a8209ab60f3d22c6dabe2ea71c57b854
-
SSDEEP
98304:6WPXIcfaFMjxGeDoikErOhWuxfF1tOKd+7zv3tElJR:7QvWNGeEjEroWudLdyzv3tEl
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3288-0-0x0000000002D40000-0x0000000002D7E000-memory.dmp upx behavioral2/memory/3288-23-0x0000000002D40000-0x0000000002D7E000-memory.dmp upx behavioral2/memory/3288-27-0x0000000002D40000-0x0000000002D7E000-memory.dmp upx behavioral2/memory/3288-45-0x0000000002D40000-0x0000000002D7E000-memory.dmp upx behavioral2/memory/3288-41-0x0000000002D40000-0x0000000002D7E000-memory.dmp upx behavioral2/memory/3288-43-0x0000000002D40000-0x0000000002D7E000-memory.dmp upx behavioral2/memory/3288-39-0x0000000002D40000-0x0000000002D7E000-memory.dmp upx behavioral2/memory/3288-37-0x0000000002D40000-0x0000000002D7E000-memory.dmp upx behavioral2/memory/3288-33-0x0000000002D40000-0x0000000002D7E000-memory.dmp upx behavioral2/memory/3288-31-0x0000000002D40000-0x0000000002D7E000-memory.dmp upx behavioral2/memory/3288-29-0x0000000002D40000-0x0000000002D7E000-memory.dmp upx behavioral2/memory/3288-25-0x0000000002D40000-0x0000000002D7E000-memory.dmp upx behavioral2/memory/3288-21-0x0000000002D40000-0x0000000002D7E000-memory.dmp upx behavioral2/memory/3288-19-0x0000000002D40000-0x0000000002D7E000-memory.dmp upx behavioral2/memory/3288-11-0x0000000002D40000-0x0000000002D7E000-memory.dmp upx behavioral2/memory/3288-46-0x0000000002D40000-0x0000000002D7E000-memory.dmp upx behavioral2/memory/3288-3-0x0000000002D40000-0x0000000002D7E000-memory.dmp upx behavioral2/memory/3288-17-0x0000000002D40000-0x0000000002D7E000-memory.dmp upx behavioral2/memory/3288-15-0x0000000002D40000-0x0000000002D7E000-memory.dmp upx behavioral2/memory/3288-13-0x0000000002D40000-0x0000000002D7E000-memory.dmp upx behavioral2/memory/3288-9-0x0000000002D40000-0x0000000002D7E000-memory.dmp upx behavioral2/memory/3288-7-0x0000000002D40000-0x0000000002D7E000-memory.dmp upx behavioral2/memory/3288-5-0x0000000002D40000-0x0000000002D7E000-memory.dmp upx behavioral2/memory/3288-2-0x0000000002D40000-0x0000000002D7E000-memory.dmp upx behavioral2/memory/3288-1-0x0000000002D40000-0x0000000002D7E000-memory.dmp upx behavioral2/memory/3288-47-0x0000000002D40000-0x0000000002D7E000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\data\051.acv rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3288 rundll32.exe 3288 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4116 wrote to memory of 3288 4116 rundll32.exe 83 PID 4116 wrote to memory of 3288 4116 rundll32.exe 83 PID 4116 wrote to memory of 3288 4116 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e093fa8ed105cdb187af1c94e2a1a9735c6026f45843f6e43212c34960164480.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e093fa8ed105cdb187af1c94e2a1a9735c6026f45843f6e43212c34960164480.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3288
-