Analysis
-
max time kernel
113s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:32
Static task
static1
Behavioral task
behavioral1
Sample
9098855ca0d77df3c3e25fd33b2b6485eb5190b1085362d3c8672ceb5c88405fN.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9098855ca0d77df3c3e25fd33b2b6485eb5190b1085362d3c8672ceb5c88405fN.dll
Resource
win10v2004-20240802-en
General
-
Target
9098855ca0d77df3c3e25fd33b2b6485eb5190b1085362d3c8672ceb5c88405fN.dll
-
Size
123KB
-
MD5
e3fc7bcdd947284e4f02fef1a63fbd40
-
SHA1
ac4acdb94df44511dd117a1a0f41ee46ba943538
-
SHA256
9098855ca0d77df3c3e25fd33b2b6485eb5190b1085362d3c8672ceb5c88405f
-
SHA512
956dff3e0103e94a4723a9208f62f9b8ccf348a8c4f23752e12a2807ded989df912befaa0057dac7dbe627eb7f24bc1c50cda846b903996daf6eba1837042c94
-
SSDEEP
3072:6yvbX3RPbvMTxoFpHWa9M9MJEVTpSRYeolGA:62XpvMGF5T9M93TylIG
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2724 wrote to memory of 2748 2724 rundll32.exe 30 PID 2724 wrote to memory of 2748 2724 rundll32.exe 30 PID 2724 wrote to memory of 2748 2724 rundll32.exe 30 PID 2724 wrote to memory of 2748 2724 rundll32.exe 30 PID 2724 wrote to memory of 2748 2724 rundll32.exe 30 PID 2724 wrote to memory of 2748 2724 rundll32.exe 30 PID 2724 wrote to memory of 2748 2724 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9098855ca0d77df3c3e25fd33b2b6485eb5190b1085362d3c8672ceb5c88405fN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9098855ca0d77df3c3e25fd33b2b6485eb5190b1085362d3c8672ceb5c88405fN.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2748
-