Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 07:34
Static task
static1
Behavioral task
behavioral1
Sample
af100ddbd0f0be7d715ddb95cbbc1f40N.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
af100ddbd0f0be7d715ddb95cbbc1f40N.dll
Resource
win10v2004-20240802-en
General
-
Target
af100ddbd0f0be7d715ddb95cbbc1f40N.dll
-
Size
6KB
-
MD5
af100ddbd0f0be7d715ddb95cbbc1f40
-
SHA1
ac25dcea95e011d03b5b3ea5f4af7fa89c35487f
-
SHA256
9f165daf2dde0c69edbeddc5b4d6b3aa56f676390802a622b5ffd3833ca2feb7
-
SHA512
0aaf19da0f49d27064667912a5759cede174f01309a58a71ea3137b5670f69def2161cd6e391540b0049e40e8a34a8a36ec65587d531050259103ce147742020
-
SSDEEP
48:6WQV5YVOqtV0H1pw9ygYVUG0wB+BDq9J5SC:8qtV0HAr41B+FqX5SC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1852 wrote to memory of 2520 1852 rundll32.exe 28 PID 1852 wrote to memory of 2520 1852 rundll32.exe 28 PID 1852 wrote to memory of 2520 1852 rundll32.exe 28 PID 1852 wrote to memory of 2520 1852 rundll32.exe 28 PID 1852 wrote to memory of 2520 1852 rundll32.exe 28 PID 1852 wrote to memory of 2520 1852 rundll32.exe 28 PID 1852 wrote to memory of 2520 1852 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\af100ddbd0f0be7d715ddb95cbbc1f40N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\af100ddbd0f0be7d715ddb95cbbc1f40N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2520
-