Analysis
-
max time kernel
91s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-09-2024 16:03
Static task
static1
Behavioral task
behavioral1
Sample
2023 TRISHA ORGANIZERpdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2023 TRISHA ORGANIZERpdf.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
msimg32.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
msimg32.dll
Resource
win10v2004-20240802-en
General
-
Target
msimg32.dll
-
Size
6.3MB
-
MD5
6c1d68c7960415c632429da5aa258062
-
SHA1
c4de42e1b1de043c1a4224eacbd429d4fbef5764
-
SHA256
5b9c3d8a7377aa103f13a12bbd81f9d833de987e1a39da3d1b30ef4a30437cfa
-
SHA512
5d3b250636bc6ee96f4b3329a29d0d4b7cbebbcf7f7ed325725b2cbd9830d51f843b472b55f5c34845f90c69fe7f80e803e44b0142df443ab5c53b2af4805e86
-
SSDEEP
98304:B6v4h6HjL23qzZ0+ca29gjYCUP5zCmstJXnYDw0uSTvYD:k4gL2dhEJXnYrTvi
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4764 wrote to memory of 4896 4764 rundll32.exe 84 PID 4764 wrote to memory of 4896 4764 rundll32.exe 84 PID 4764 wrote to memory of 4896 4764 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\msimg32.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\msimg32.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4896
-