Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 02:27
Behavioral task
behavioral1
Sample
d8ab177de127bcc2797ecc4dc6f988c2b82760fe5aa9938fbd7ebd2f976825c6.dll
Resource
win7-20240903-en
3 signatures
150 seconds
General
-
Target
d8ab177de127bcc2797ecc4dc6f988c2b82760fe5aa9938fbd7ebd2f976825c6.dll
-
Size
25KB
-
MD5
3996d56287a34c04981d4e315bf2afd4
-
SHA1
9904053e5bc142898d894026172edd7a71c7a4ca
-
SHA256
d8ab177de127bcc2797ecc4dc6f988c2b82760fe5aa9938fbd7ebd2f976825c6
-
SHA512
bf4aa5a037fb7a8ae4b60ec681d05575cb0e06f13e60ce77db5debbf7b431d0bd850d20734872f6397a9f374c562b4d9248290d40554e011c4b7e976b6542f49
-
SSDEEP
384:dmD/Y0M6vDHgJZ1wZj9BCHjvBRnM1a0INSVBt2EVeNpFtPw9Em:duYxCDHgJZMj9QBlSVov7w9
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2644-3-0x0000000074B20000-0x0000000074B2B000-memory.dmp upx behavioral1/memory/2644-0-0x0000000074B30000-0x0000000074B3B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2644 3048 rundll32.exe 30 PID 3048 wrote to memory of 2644 3048 rundll32.exe 30 PID 3048 wrote to memory of 2644 3048 rundll32.exe 30 PID 3048 wrote to memory of 2644 3048 rundll32.exe 30 PID 3048 wrote to memory of 2644 3048 rundll32.exe 30 PID 3048 wrote to memory of 2644 3048 rundll32.exe 30 PID 3048 wrote to memory of 2644 3048 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d8ab177de127bcc2797ecc4dc6f988c2b82760fe5aa9938fbd7ebd2f976825c6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d8ab177de127bcc2797ecc4dc6f988c2b82760fe5aa9938fbd7ebd2f976825c6.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2644
-