Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 13:27
Behavioral task
behavioral1
Sample
2a367d9d6dee7afa5c97ae81175b25f8ee4ef25f9969954f7a9156d451df9a65.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2a367d9d6dee7afa5c97ae81175b25f8ee4ef25f9969954f7a9156d451df9a65.dll
Resource
win10v2004-20240802-en
General
-
Target
2a367d9d6dee7afa5c97ae81175b25f8ee4ef25f9969954f7a9156d451df9a65.dll
-
Size
4.0MB
-
MD5
0346a5abf5d68620d90dcd971d175a39
-
SHA1
86f6c5e458c3b2e6c5ce97e7bab0b54797427f1b
-
SHA256
2a367d9d6dee7afa5c97ae81175b25f8ee4ef25f9969954f7a9156d451df9a65
-
SHA512
d6ead3b168480c278ca11289a793f1c4f24aeb5792424ee1aba85b2971f6c9860689201408f09e17e98bbf624d6fce866bd84c5de4c6fb810f549ac7d8acebbe
-
SSDEEP
3072:RmkH4V2aLdAJJ5WcZW4TH25KXs8o66yWpQJU6fUzpqtcWGQT0Jkegj9Ucr54P2JK:Ekvae5Wck4CAal6U6MzJk7j6uJeNLl
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2848 wrote to memory of 3060 2848 rundll32.exe 30 PID 2848 wrote to memory of 3060 2848 rundll32.exe 30 PID 2848 wrote to memory of 3060 2848 rundll32.exe 30 PID 2848 wrote to memory of 3060 2848 rundll32.exe 30 PID 2848 wrote to memory of 3060 2848 rundll32.exe 30 PID 2848 wrote to memory of 3060 2848 rundll32.exe 30 PID 2848 wrote to memory of 3060 2848 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2a367d9d6dee7afa5c97ae81175b25f8ee4ef25f9969954f7a9156d451df9a65.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2a367d9d6dee7afa5c97ae81175b25f8ee4ef25f9969954f7a9156d451df9a65.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3060
-