Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 01:21
Static task
static1
Behavioral task
behavioral1
Sample
afeb37a2334be5204273fe65785e3978a1c0d20bec3b683a28f1c156039c4847.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
afeb37a2334be5204273fe65785e3978a1c0d20bec3b683a28f1c156039c4847.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/FileInfo.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/FileInfo.dll
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/FileInfo.dll
-
Size
36KB
-
MD5
3fc952c7ad976728c7343f0e0c858fd3
-
SHA1
43b6a79a324eefa00fc81e25365f524265cab4d6
-
SHA256
811c6a9f7ae924fdb9c4dd817b20e4cd0b5250e620434c9f91dbf84d4f57d887
-
SHA512
d96f76deecca4fa593eba3ba6397d7a13bc0f7265f825ac2315e4fe8d4a7886378013e488778e442d0779364ab927bc8d04366e133ea361f502105261093f453
-
SSDEEP
768:+wJIIIIY26ImXmJcuuJpZ5N4msWvIe+G5QAdV5O29LKmQkWnD1bKwNr11lb+lGeY:+GIIII6m2ZZnIe+G5QAdV5O29LKLkioo
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3032 wrote to memory of 3028 3032 rundll32.exe 30 PID 3032 wrote to memory of 3028 3032 rundll32.exe 30 PID 3032 wrote to memory of 3028 3032 rundll32.exe 30 PID 3032 wrote to memory of 3028 3032 rundll32.exe 30 PID 3032 wrote to memory of 3028 3032 rundll32.exe 30 PID 3032 wrote to memory of 3028 3032 rundll32.exe 30 PID 3032 wrote to memory of 3028 3032 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\FileInfo.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\FileInfo.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3028
-