Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 23:07
Static task
static1
Behavioral task
behavioral1
Sample
efa8a48ebb50ac98c07b97c431c24529f35c28f2bab5a1557899eb039d130acb.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
efa8a48ebb50ac98c07b97c431c24529f35c28f2bab5a1557899eb039d130acb.dll
Resource
win10v2004-20240910-en
General
-
Target
efa8a48ebb50ac98c07b97c431c24529f35c28f2bab5a1557899eb039d130acb.dll
-
Size
32KB
-
MD5
4610040bdcd610dd11842a883cc0e54c
-
SHA1
65297bbb43501523f8f0fcc4ec503fc2cb63df91
-
SHA256
efa8a48ebb50ac98c07b97c431c24529f35c28f2bab5a1557899eb039d130acb
-
SHA512
3c625faec263bf5e974d90a4c413f70e1d48a3d73ca4d182b8530e279edf8e57a37fcd9e2472cb025c92a7c8e5aa4c2f02fb3125523416be9d6ffb66c737a57d
-
SSDEEP
384:ezO0X7DcxRkAOGTl/aWaml0CoZJRf8CypmtqivWo9KLF:ezO0/c8AOGTlidJRf8CZtq8Wo9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 540 wrote to memory of 1672 540 rundll32.exe 31 PID 540 wrote to memory of 1672 540 rundll32.exe 31 PID 540 wrote to memory of 1672 540 rundll32.exe 31 PID 540 wrote to memory of 1672 540 rundll32.exe 31 PID 540 wrote to memory of 1672 540 rundll32.exe 31 PID 540 wrote to memory of 1672 540 rundll32.exe 31 PID 540 wrote to memory of 1672 540 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\efa8a48ebb50ac98c07b97c431c24529f35c28f2bab5a1557899eb039d130acb.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\efa8a48ebb50ac98c07b97c431c24529f35c28f2bab5a1557899eb039d130acb.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1672
-