Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 02:38
Static task
static1
Behavioral task
behavioral1
Sample
eVOL v21.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eVOL v21.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
eVOL v21/hack/hack.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
eVOL v21/hack/hack.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
eVOL v21/hack/loader.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
eVOL v21/hack/loader.exe
Resource
win10v2004-20240802-en
General
-
Target
eVOL v21/hack/hack.dll
-
Size
2.2MB
-
MD5
7472dc3c10b24f768b25f65c3d247513
-
SHA1
898467cfa2c7c2eadfd5a6be2702f8ae26e9c8c5
-
SHA256
633c63459e25f71adacd72e0bf533401fc59c55e3c1300a5f3605239ab3e0370
-
SHA512
4f47da89e6b95500cb75df3d0021debfc179e6c062a4c2ec9bddec2f26beece61350f68087fce17a0db653d0f877a822b3763e25e9cb0f3a683d004d6c25991c
-
SSDEEP
49152:QlYcpxvAaekx8XQG25uduIEDxtvuso1W5Z+SYaMLn1tWENPz3/H5:QlVOUn3uXEDx5o4H/hkn1tWENL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2376 2524 rundll32.exe 31 PID 2524 wrote to memory of 2376 2524 rundll32.exe 31 PID 2524 wrote to memory of 2376 2524 rundll32.exe 31 PID 2524 wrote to memory of 2376 2524 rundll32.exe 31 PID 2524 wrote to memory of 2376 2524 rundll32.exe 31 PID 2524 wrote to memory of 2376 2524 rundll32.exe 31 PID 2524 wrote to memory of 2376 2524 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\eVOL v21\hack\hack.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\eVOL v21\hack\hack.dll",#12⤵
- System Location Discovery: System Language Discovery
PID:2376
-