Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 03:24
Static task
static1
Behavioral task
behavioral1
Sample
ee079f11f5b3370370ee1172f3311836e4160dfc9ad06297d17db7670190bc15.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee079f11f5b3370370ee1172f3311836e4160dfc9ad06297d17db7670190bc15.dll
Resource
win10v2004-20240802-en
General
-
Target
ee079f11f5b3370370ee1172f3311836e4160dfc9ad06297d17db7670190bc15.dll
-
Size
5KB
-
MD5
50f5bab0f876fcd3b3f74d0f7ee98342
-
SHA1
39ec95800944d6885865f19dbddc3f79188a4c89
-
SHA256
ee079f11f5b3370370ee1172f3311836e4160dfc9ad06297d17db7670190bc15
-
SHA512
0a98c4d98c9b1ef2cf1ad978c0dc950665e739c2a2dccf9004cf2b663decdc03b7df4c754addec1015ce2126642397916c9ead295d067da5c07c33cb69e37072
-
SSDEEP
48:CCy86+Wet9Q/iooHeiefhe+/lSMYEqbb1aBHqbq1qbZYqb:hy859x0P8MaFp2kN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2492 1976 rundll32.exe 30 PID 1976 wrote to memory of 2492 1976 rundll32.exe 30 PID 1976 wrote to memory of 2492 1976 rundll32.exe 30 PID 1976 wrote to memory of 2492 1976 rundll32.exe 30 PID 1976 wrote to memory of 2492 1976 rundll32.exe 30 PID 1976 wrote to memory of 2492 1976 rundll32.exe 30 PID 1976 wrote to memory of 2492 1976 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ee079f11f5b3370370ee1172f3311836e4160dfc9ad06297d17db7670190bc15.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ee079f11f5b3370370ee1172f3311836e4160dfc9ad06297d17db7670190bc15.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2492
-