Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 11:52
Static task
static1
Behavioral task
behavioral1
Sample
2907089a56595fed2482b63f704eb9f50b003e53e537d14eaa7d386c43881838.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2907089a56595fed2482b63f704eb9f50b003e53e537d14eaa7d386c43881838.dll
Resource
win10v2004-20240802-en
General
-
Target
2907089a56595fed2482b63f704eb9f50b003e53e537d14eaa7d386c43881838.dll
-
Size
4.7MB
-
MD5
ed93c25add3a261b66bce666c25c056d
-
SHA1
44ddef796c8eda19c26ab47630e42fb9db6ca8f5
-
SHA256
2907089a56595fed2482b63f704eb9f50b003e53e537d14eaa7d386c43881838
-
SHA512
f37f18b80df9aee6ebae9fd66cd5e466b98602b040314d990a24cc1efcfff1c37ec2ad1723bc312ac42df1402ff5e245a5b65581af1c1c7cf8bc4bacb9270d2b
-
SSDEEP
49152:m4pj6aBkgUAYNChkGRm05ZPE0TY408tKzIYzLxaOBBST1WoE:f4ChRZ5ZPtt0KKzh7OWo
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2428 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1292 wrote to memory of 2428 1292 rundll32.exe 30 PID 1292 wrote to memory of 2428 1292 rundll32.exe 30 PID 1292 wrote to memory of 2428 1292 rundll32.exe 30 PID 1292 wrote to memory of 2428 1292 rundll32.exe 30 PID 1292 wrote to memory of 2428 1292 rundll32.exe 30 PID 1292 wrote to memory of 2428 1292 rundll32.exe 30 PID 1292 wrote to memory of 2428 1292 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2907089a56595fed2482b63f704eb9f50b003e53e537d14eaa7d386c43881838.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2907089a56595fed2482b63f704eb9f50b003e53e537d14eaa7d386c43881838.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2428
-