Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 08:14
Static task
static1
Behavioral task
behavioral1
Sample
TrojanDownloader.Win32.Andromeda.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
TrojanDownloader.Win32.Andromeda.dll
Resource
win10v2004-20240802-en
General
-
Target
TrojanDownloader.Win32.Andromeda.dll
-
Size
6KB
-
MD5
4044dd5cbccae887e15276bd53bdc5b0
-
SHA1
4e8a2d59ad379152fcd408ead5bb63ffcd74f69f
-
SHA256
453fbd096cc558359f28d9c47f554b119a582e9a5def003e39ef6135b0e831bd
-
SHA512
219b3c0e184d6e97c2b566d98b65a3f73fd3dcfd78a8b292fa273f1367c7f72ebf367f2e01bd12b3aa64e7fcf47565c3dc7190f0e2c8298e8ef6adcc41b85b5b
-
SSDEEP
192:EHRh1eppvLuwIcC9995T9szXOqIKONU/:EHROMwIp9995T9srxONU/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2028 wrote to memory of 840 2028 rundll32.exe 82 PID 2028 wrote to memory of 840 2028 rundll32.exe 82 PID 2028 wrote to memory of 840 2028 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\TrojanDownloader.Win32.Andromeda.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\TrojanDownloader.Win32.Andromeda.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:840
-