Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 03:01
Behavioral task
behavioral1
Sample
cc checker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cc checker.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
dimap.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
dimap.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
dimsntfy.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
dimsntfy.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
dimsroam.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
dimsroam.dll
Resource
win10v2004-20240802-en
General
-
Target
dimap.dll
-
Size
43KB
-
MD5
b61675bfae56f114ae3d4f938a9d9aea
-
SHA1
72e4d66e319ccabe8e1ef641b92724eba15dd3d6
-
SHA256
dabe2ba75bcff8eea2f0d7d086b012ad84ff49dbf6be8371b24ce69fcacc575a
-
SHA512
fd963378918d91aa4eb6eabadb662976f2626ae107bacaea01271b8d458f1d5e51393b116ac9c2b1c551a3fcb58c60642463e4f4ee7d67251abe5d0493a8de19
-
SSDEEP
768:9CpUMmwufNXBkMjtwIzShvSEl4vmA+aZe83ecxhga3OU9bpb:cXPuffkctw06aEonZe8umhgCOUzb
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1716 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2432 wrote to memory of 1716 2432 rundll32.exe 28 PID 2432 wrote to memory of 1716 2432 rundll32.exe 28 PID 2432 wrote to memory of 1716 2432 rundll32.exe 28 PID 2432 wrote to memory of 1716 2432 rundll32.exe 28 PID 2432 wrote to memory of 1716 2432 rundll32.exe 28 PID 2432 wrote to memory of 1716 2432 rundll32.exe 28 PID 2432 wrote to memory of 1716 2432 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dimap.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dimap.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1716
-