Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 23:27
Static task
static1
Behavioral task
behavioral1
Sample
ffefd10ae5387196f0b371f7d66753a0N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ffefd10ae5387196f0b371f7d66753a0N.dll
Resource
win10v2004-20240802-en
General
-
Target
ffefd10ae5387196f0b371f7d66753a0N.dll
-
Size
5KB
-
MD5
ffefd10ae5387196f0b371f7d66753a0
-
SHA1
be4bfe3daf245c955182502545019081beee9e47
-
SHA256
e1303c0519fe80e01a487dc82e850e5f7e00030fb86440b971d39c8261bb9a8b
-
SHA512
6f1ca20227f605cc0b1e11b39d5c7b3f2fa16afab1ceed864ccbfa3024cf638528570fd12d449b40a5893f5b16e5b9817637a40347b4dd15104b80cdd07de17a
-
SSDEEP
96:nEY2RrF1eqwi42xGsImTiNhwdMSkiFx9/PjMhTq:EHRh1epp2xGiiKMSksjM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2760 2756 rundll32.exe 30 PID 2756 wrote to memory of 2760 2756 rundll32.exe 30 PID 2756 wrote to memory of 2760 2756 rundll32.exe 30 PID 2756 wrote to memory of 2760 2756 rundll32.exe 30 PID 2756 wrote to memory of 2760 2756 rundll32.exe 30 PID 2756 wrote to memory of 2760 2756 rundll32.exe 30 PID 2756 wrote to memory of 2760 2756 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ffefd10ae5387196f0b371f7d66753a0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ffefd10ae5387196f0b371f7d66753a0N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2760
-