Analysis
-
max time kernel
94s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 08:57
Static task
static1
Behavioral task
behavioral1
Sample
46ecea4635431b29d8210193d177ed0c874925f33cba4d3701ce6ed115e9c9a2N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
46ecea4635431b29d8210193d177ed0c874925f33cba4d3701ce6ed115e9c9a2N.dll
Resource
win10v2004-20240802-en
General
-
Target
46ecea4635431b29d8210193d177ed0c874925f33cba4d3701ce6ed115e9c9a2N.dll
-
Size
172KB
-
MD5
f8d162576f6e456d1c212e58d2d57120
-
SHA1
685cb695f5a5ee636fccb9218a5b6959f78d3f0a
-
SHA256
46ecea4635431b29d8210193d177ed0c874925f33cba4d3701ce6ed115e9c9a2
-
SHA512
95fe8db41bf9c5f0a5d43e5bbe71614499b080b7c78c32972e4617a54233ee3fec9e49c50758bb5820215d38021ce2bce21c4cc37bd5c47574f67707407b1d5d
-
SSDEEP
3072:BmfVCyNYUv8FiGZmvKs7KoRjhRj80P5EmXYrXr2ZvV0:kfVPTvuiGZmvzKoRjr40PWmX8C
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2348 wrote to memory of 584 2348 rundll32.exe 31 PID 2348 wrote to memory of 584 2348 rundll32.exe 31 PID 2348 wrote to memory of 584 2348 rundll32.exe 31 PID 2348 wrote to memory of 584 2348 rundll32.exe 31 PID 2348 wrote to memory of 584 2348 rundll32.exe 31 PID 2348 wrote to memory of 584 2348 rundll32.exe 31 PID 2348 wrote to memory of 584 2348 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\46ecea4635431b29d8210193d177ed0c874925f33cba4d3701ce6ed115e9c9a2N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\46ecea4635431b29d8210193d177ed0c874925f33cba4d3701ce6ed115e9c9a2N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:584
-