Analysis
-
max time kernel
93s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 18:38
Behavioral task
behavioral1
Sample
0cf2891f08e684900be07c0207b391479081a96eca09d0e253855f6e3b5d29bc.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0cf2891f08e684900be07c0207b391479081a96eca09d0e253855f6e3b5d29bc.dll
Resource
win10v2004-20240802-en
General
-
Target
0cf2891f08e684900be07c0207b391479081a96eca09d0e253855f6e3b5d29bc.dll
-
Size
753KB
-
MD5
cdd02536a3723e69e6c03cc36a2ff6a5
-
SHA1
094e24390ebf848c1bfa8bb340f2b6ca66ce5097
-
SHA256
0cf2891f08e684900be07c0207b391479081a96eca09d0e253855f6e3b5d29bc
-
SHA512
d8c8d7e5fed1eb25a4bf1cce71177569b38014787cfaa2315b3b51b2df1abcee6462b88e45ed88b68bb53f7c3cf495c14fb9c030862be9f39de621e5691fba61
-
SSDEEP
12288:1oMAwOrWpIRg8c9vYMEWIL6JVyfvrJlOXifG2JYkXCAA4DtdFXIq6xGJOpqUbHlc:1TOrY88YMVCTGvFkXpDtdP0GkpHjl5Jc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 35 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F27E0D16-593B-8BF4-FCF7-35F0BEB0B386}\1.0\HELPDIR\ rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{37CB74D0-0E21-4D4B-87B9-E6D7E3B9C07D}\TypeLib rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{37CB74D0-0E21-4D4B-87B9-E6D7E3B9C07D}\Version\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{37CB74D0-0E21-4D4B-87B9-E6D7E3B9C07D}\VersionIndependentProgID\ rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{37CB74D0-0E21-4D4B-87B9-E6D7E3B9C07D}\ProgID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{37CB74D0-0E21-4D4B-87B9-E6D7E3B9C07D}\Programmable rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F27E0D16-593B-8BF4-FCF7-35F0BEB0B386}\1.0\FLAGS\ = "0" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F27E0D16-593B-8BF4-FCF7-35F0BEB0B386}\1.0\HELPDIR rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{37CB74D0-0E21-4D4B-87B9-E6D7E3B9C07D}\VersionIndependentProgID\ = "IMAPI2.MsftWriteEngine2" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F27E0D16-593B-8BF4-FCF7-35F0BEB0B386}\1.0\0\win64\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F27E0D16-593B-8BF4-FCF7-35F0BEB0B386}\1.0\FLAGS\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{37CB74D0-0E21-4D4B-87B9-E6D7E3B9C07D}\ProgID\ = "IMAPI2.MsftWriteEngine2.1" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F27E0D16-593B-8BF4-FCF7-35F0BEB0B386}\1.0\0\win64 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{37CB74D0-0E21-4D4B-87B9-E6D7E3B9C07D}\TypeLib\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{37CB74D0-0E21-4D4B-87B9-E6D7E3B9C07D}\TypeLib\ = "{F27E0D16-593B-8BF4-FCF7-35F0BEB0B386}" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{37CB74D0-0E21-4D4B-87B9-E6D7E3B9C07D} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F27E0D16-593B-8BF4-FCF7-35F0BEB0B386}\1.0\0\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F27E0D16-593B-8BF4-FCF7-35F0BEB0B386}\1.0\HELPDIR\ = "%PROGRAMFILES%\\Windows Media Player" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{37CB74D0-0E21-4D4B-87B9-E6D7E3B9C07D}\ = "Onahi.Inasozzi class" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{37CB74D0-0E21-4D4B-87B9-E6D7E3B9C07D}\Version\ = "1.0" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F27E0D16-593B-8BF4-FCF7-35F0BEB0B386}\1.0\0\win64\ = "%PROGRAMFILES%\\Windows Media Player\\wmpnetwk.exe" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F27E0D16-593B-8BF4-FCF7-35F0BEB0B386}\1.0\FLAGS rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{37CB74D0-0E21-4D4B-87B9-E6D7E3B9C07D}\Version rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{37CB74D0-0E21-4D4B-87B9-E6D7E3B9C07D}\InprocServer32\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{37CB74D0-0E21-4D4B-87B9-E6D7E3B9C07D}\InprocServer32\ = "C:\\Windows\\SysWOW64\\imapi2.dll" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F27E0D16-593B-8BF4-FCF7-35F0BEB0B386}\1.0\ = "Microsoft Windows Media Player Network Sharing Service Content Directory Service Library v2.0" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F27E0D16-593B-8BF4-FCF7-35F0BEB0B386}\1.0\0 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F27E0D16-593B-8BF4-FCF7-35F0BEB0B386}\1.0 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{37CB74D0-0E21-4D4B-87B9-E6D7E3B9C07D}\InprocServer32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{37CB74D0-0E21-4D4B-87B9-E6D7E3B9C07D}\ProgID\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{37CB74D0-0E21-4D4B-87B9-E6D7E3B9C07D}\Programmable\ rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F27E0D16-593B-8BF4-FCF7-35F0BEB0B386} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F27E0D16-593B-8BF4-FCF7-35F0BEB0B386}\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F27E0D16-593B-8BF4-FCF7-35F0BEB0B386}\1.0\ rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{37CB74D0-0E21-4D4B-87B9-E6D7E3B9C07D}\VersionIndependentProgID rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3092 wrote to memory of 2092 3092 rundll32.exe 83 PID 3092 wrote to memory of 2092 3092 rundll32.exe 83 PID 3092 wrote to memory of 2092 3092 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0cf2891f08e684900be07c0207b391479081a96eca09d0e253855f6e3b5d29bc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0cf2891f08e684900be07c0207b391479081a96eca09d0e253855f6e3b5d29bc.dll,#12⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2092
-