Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 11:06
Static task
static1
Behavioral task
behavioral1
Sample
41e0b0556fb3c1f96ad44ab871b6ac00N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
41e0b0556fb3c1f96ad44ab871b6ac00N.dll
Resource
win10v2004-20240802-en
General
-
Target
41e0b0556fb3c1f96ad44ab871b6ac00N.dll
-
Size
6KB
-
MD5
41e0b0556fb3c1f96ad44ab871b6ac00
-
SHA1
44a421a1489d2b1b4602405ec706487bff2ceaa7
-
SHA256
a7b7436101f6129476cc847aed4ae8d59a9b4ee0066a4e558d294dc7a18e4ebc
-
SHA512
5ca9d18aa93de3defd9feb86e57b60a697dfe4f9a44c0ad93c884cf8b5fd94a10cf1c5df365706d233ec4ca2cbdbfcc56f3f2820ea2c38f1fb0295ef0fb79efe
-
SSDEEP
192:EHRh1eppoMlRNi2fEwHgjLfDEzonGpvJ:EHROpljiPUgvfDfGpv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2532 2260 rundll32.exe 30 PID 2260 wrote to memory of 2532 2260 rundll32.exe 30 PID 2260 wrote to memory of 2532 2260 rundll32.exe 30 PID 2260 wrote to memory of 2532 2260 rundll32.exe 30 PID 2260 wrote to memory of 2532 2260 rundll32.exe 30 PID 2260 wrote to memory of 2532 2260 rundll32.exe 30 PID 2260 wrote to memory of 2532 2260 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\41e0b0556fb3c1f96ad44ab871b6ac00N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\41e0b0556fb3c1f96ad44ab871b6ac00N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2532
-