Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 19:07
Static task
static1
Behavioral task
behavioral1
Sample
16f974e2d30079c81e83703cb715a0337cbc1107b22fa26464d4786411d71b81.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
16f974e2d30079c81e83703cb715a0337cbc1107b22fa26464d4786411d71b81.dll
Resource
win10v2004-20240802-en
General
-
Target
16f974e2d30079c81e83703cb715a0337cbc1107b22fa26464d4786411d71b81.dll
-
Size
6KB
-
MD5
2056de9e6c01d11d1e5ca01ee216b43f
-
SHA1
e62d3d4688790d75e872f4d70ad69166deb82efd
-
SHA256
16f974e2d30079c81e83703cb715a0337cbc1107b22fa26464d4786411d71b81
-
SHA512
c71e0d8ce41d5f2ba0254c1b98c844902b55223e88625d62e0894e0f90c4face7e61f43e5ba1f0a418b204d8539fd0470fc21c733af3645135f3b45ff8049adf
-
SSDEEP
48:63mll5YVOa9VUX1iwbQWu0yZB+BDq9J5SH:VDa9VUX9bQWmB+FqX5SH
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2244 2188 rundll32.exe 30 PID 2188 wrote to memory of 2244 2188 rundll32.exe 30 PID 2188 wrote to memory of 2244 2188 rundll32.exe 30 PID 2188 wrote to memory of 2244 2188 rundll32.exe 30 PID 2188 wrote to memory of 2244 2188 rundll32.exe 30 PID 2188 wrote to memory of 2244 2188 rundll32.exe 30 PID 2188 wrote to memory of 2244 2188 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\16f974e2d30079c81e83703cb715a0337cbc1107b22fa26464d4786411d71b81.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\16f974e2d30079c81e83703cb715a0337cbc1107b22fa26464d4786411d71b81.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2244
-