Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 13:56
Static task
static1
Behavioral task
behavioral1
Sample
44118106ca7cc349aed79779751acaecd44eca8f1d4ca220fa4e16f42685905bN.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
44118106ca7cc349aed79779751acaecd44eca8f1d4ca220fa4e16f42685905bN.dll
Resource
win10v2004-20240802-en
General
-
Target
44118106ca7cc349aed79779751acaecd44eca8f1d4ca220fa4e16f42685905bN.dll
-
Size
6KB
-
MD5
0970f9245ddb7280fb382191b0b5db10
-
SHA1
162eeb502a3ebe2fbaa7c460183aa4f6f6a5b548
-
SHA256
44118106ca7cc349aed79779751acaecd44eca8f1d4ca220fa4e16f42685905b
-
SHA512
215819c1fee56d56ee6a796c14342a49a83a250ca795a251cc6cdec54e30d2ba0a45068177a2e52aabefc48616b4abd07cbd9a7a167d75dc9f0b81e03f744f6a
-
SSDEEP
48:SsGp63gAST0cMLlD7prUlG9Nzg8ZwBTMRkv5Oq5Zrb5VB8AsQdB5Z+m5dKpXA/gB:VGEETrMLH52Oq5ZrVnTPdKpXcAR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2768 wrote to memory of 2748 2768 rundll32.exe 30 PID 2768 wrote to memory of 2748 2768 rundll32.exe 30 PID 2768 wrote to memory of 2748 2768 rundll32.exe 30 PID 2768 wrote to memory of 2748 2768 rundll32.exe 30 PID 2768 wrote to memory of 2748 2768 rundll32.exe 30 PID 2768 wrote to memory of 2748 2768 rundll32.exe 30 PID 2768 wrote to memory of 2748 2768 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\44118106ca7cc349aed79779751acaecd44eca8f1d4ca220fa4e16f42685905bN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\44118106ca7cc349aed79779751acaecd44eca8f1d4ca220fa4e16f42685905bN.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2748
-