Overview
overview
7Static
static
3448ed11e21...aN.exe
windows7-x64
7448ed11e21...aN.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$TEMP/A563...62.dll
windows7-x64
3$TEMP/A563...62.dll
windows10-2004-x64
3$TEMP/A563...34.dll
windows7-x64
3$TEMP/A563...34.dll
windows10-2004-x64
3$TEMP/A563...31.dll
windows7-x64
3$TEMP/A563...31.dll
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 04:56
Static task
static1
Behavioral task
behavioral1
Sample
448ed11e215ebae9cafac4a3ad3971763fde64ae5faed56dd72655b54740e89aN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
448ed11e215ebae9cafac4a3ad3971763fde64ae5faed56dd72655b54740e89aN.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$TEMP/A5632984/e1050862.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$TEMP/A5632984/e1050862.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral7
Sample
$TEMP/A5632984/r1062634.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$TEMP/A5632984/r1062634.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral9
Sample
$TEMP/A5632984/w1057331.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$TEMP/A5632984/w1057331.dll
Resource
win10v2004-20240802-en
General
-
Target
$TEMP/A5632984/e1050862.dll
-
Size
278KB
-
MD5
17bddadca7044cc7b8406f1ca45210df
-
SHA1
d74c5236542f4ddbb50cd113dedcd05aa9861ca9
-
SHA256
4406dc1789f1ebdbfebb7796719d21dcce2250f3a0a07f204cfd0b4f93725f6c
-
SHA512
1abf4e41912e18b77f7e0ea7ce98e0a5760a554cf79c78dd8ccaf04589fc02579b0fbb5a822acf2d098c2362b778821b1e5e870a55cba5834566a723c0716d50
-
SSDEEP
6144:fjwzo8zXF7mDiXslRbsvDv8vD9JT2p3n:fPwXFUJsrv8vD9Qn
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2808 wrote to memory of 3032 2808 rundll32.exe 30 PID 2808 wrote to memory of 3032 2808 rundll32.exe 30 PID 2808 wrote to memory of 3032 2808 rundll32.exe 30 PID 2808 wrote to memory of 3032 2808 rundll32.exe 30 PID 2808 wrote to memory of 3032 2808 rundll32.exe 30 PID 2808 wrote to memory of 3032 2808 rundll32.exe 30 PID 2808 wrote to memory of 3032 2808 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$TEMP\A5632984\e1050862.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$TEMP\A5632984\e1050862.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3032
-