Analysis
-
max time kernel
120s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-09-2024 10:31
Behavioral task
behavioral1
Sample
msimg32.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
msimg32.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
rename_me.pdf
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
rename_me.pdf
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
撤銷版權的法律文件屬於香港華納音樂.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
撤銷版權的法律文件屬於香港華納音樂.exe
Resource
win10v2004-20240802-en
General
-
Target
msimg32.dll
-
Size
100.0MB
-
MD5
18f1a910ba13acd4f778cc64de5914c3
-
SHA1
387436d406f805289d31f44a4daf413c0d82211d
-
SHA256
2ebb94917f88ecd55f050b10407315098cc1586531836a952214bb8f4113468b
-
SHA512
7dcc6e2ba89759c2a068d0286ed04584f8d5545b1208ca9bd1e066c6963498b2d20240e497a832a4b7b6b83ae84300fac6bc907a30a5aae56404b75076339977
-
SSDEEP
24576:P1Cbm39DOBVXaIFP698DWk7PVmrOqF1HLOkVyLP7E8Lr19Eq+soYTtweRvrXSTtV:iJVWAc6wZLOkALP7fiqHoA5ETtI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid Process procid_target PID 2240 wrote to memory of 2788 2240 rundll32.exe 30 PID 2240 wrote to memory of 2788 2240 rundll32.exe 30 PID 2240 wrote to memory of 2788 2240 rundll32.exe 30 PID 2240 wrote to memory of 2788 2240 rundll32.exe 30 PID 2240 wrote to memory of 2788 2240 rundll32.exe 30 PID 2240 wrote to memory of 2788 2240 rundll32.exe 30 PID 2240 wrote to memory of 2788 2240 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\msimg32.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\msimg32.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2788
-