Analysis
-
max time kernel
16s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:48
Behavioral task
behavioral1
Sample
d53b4a368f614d37ec46ed664b8c753853c61e75ebd17dec0621bc12c90620e0N.dll
Resource
win7-20240708-en
3 signatures
120 seconds
General
-
Target
d53b4a368f614d37ec46ed664b8c753853c61e75ebd17dec0621bc12c90620e0N.dll
-
Size
16KB
-
MD5
e05c8de046b878e0f5be56c670c4c540
-
SHA1
9bc4a138ada96cac67ff14da3171f14d4220641e
-
SHA256
d53b4a368f614d37ec46ed664b8c753853c61e75ebd17dec0621bc12c90620e0
-
SHA512
0b53c8cdcfb19e3feff1b8f513d6c95a2a72ce22abf89c61741ac39674d97bbee21a469908586235a17412f6e58446d92eceab229fd1623ca2b879eab53f05e5
-
SSDEEP
384:Hp7Zoqdi+fTEt5/XYQddURBKsxGfvmUQZ654fgMwKC:ToqQ+fQv/YqqRBK5mUj5dwC
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/404-0-0x0000000010000000-0x0000000010011000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1720 wrote to memory of 404 1720 rundll32.exe 30 PID 1720 wrote to memory of 404 1720 rundll32.exe 30 PID 1720 wrote to memory of 404 1720 rundll32.exe 30 PID 1720 wrote to memory of 404 1720 rundll32.exe 30 PID 1720 wrote to memory of 404 1720 rundll32.exe 30 PID 1720 wrote to memory of 404 1720 rundll32.exe 30 PID 1720 wrote to memory of 404 1720 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d53b4a368f614d37ec46ed664b8c753853c61e75ebd17dec0621bc12c90620e0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d53b4a368f614d37ec46ed664b8c753853c61e75ebd17dec0621bc12c90620e0N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:404
-