Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 12:35
Static task
static1
Behavioral task
behavioral1
Sample
cef51cfdf04075358dc42c0292420cc475e2fc462df6b7035851cb47e62536c3.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cef51cfdf04075358dc42c0292420cc475e2fc462df6b7035851cb47e62536c3.dll
Resource
win10v2004-20240802-en
General
-
Target
cef51cfdf04075358dc42c0292420cc475e2fc462df6b7035851cb47e62536c3.dll
-
Size
852KB
-
MD5
07b0bc92f3cb37ee06976b5b4628009f
-
SHA1
44dc952298a6c2f915763bf634548f205a2c9b8f
-
SHA256
cef51cfdf04075358dc42c0292420cc475e2fc462df6b7035851cb47e62536c3
-
SHA512
89b2c8c0e476f72989c7d5286cd5d2224d1451a32a1a347ed8d6d55aa0cb4e512bf3972ac2a7c8a58ed9176058657e03ea3ef6f355f17db4760fdef06b907ef9
-
SSDEEP
12288:AUK42Wd9bWSpl3bVa/HNQ7Xhm3Nh63Hq/+Vt/XpO8lXoKqrk0IAu+q:AUAWdUSr3bV4NEXXq/+LBik0Ruh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1908 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2360 wrote to memory of 1908 2360 rundll32.exe 30 PID 2360 wrote to memory of 1908 2360 rundll32.exe 30 PID 2360 wrote to memory of 1908 2360 rundll32.exe 30 PID 2360 wrote to memory of 1908 2360 rundll32.exe 30 PID 2360 wrote to memory of 1908 2360 rundll32.exe 30 PID 2360 wrote to memory of 1908 2360 rundll32.exe 30 PID 2360 wrote to memory of 1908 2360 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cef51cfdf04075358dc42c0292420cc475e2fc462df6b7035851cb47e62536c3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cef51cfdf04075358dc42c0292420cc475e2fc462df6b7035851cb47e62536c3.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1908
-