Overview
overview
7Static
static
3Tone2_KeyGen.exe
windows7-x64
7Tone2_KeyGen.exe
windows10-2004-x64
7$TEMP/BASSMOD.dll
windows7-x64
3$TEMP/BASSMOD.dll
windows10-2004-x64
3$TEMP/R2RGLD2KG.dll
windows7-x64
3$TEMP/R2RGLD2KG.dll
windows10-2004-x64
3$TEMP/keygen.exe
windows7-x64
3$TEMP/keygen.exe
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 04:32
Static task
static1
Behavioral task
behavioral1
Sample
Tone2_KeyGen.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Tone2_KeyGen.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$TEMP/BASSMOD.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$TEMP/BASSMOD.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$TEMP/R2RGLD2KG.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$TEMP/R2RGLD2KG.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$TEMP/keygen.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$TEMP/keygen.exe
Resource
win10v2004-20240802-en
General
-
Target
$TEMP/R2RGLD2KG.dll
-
Size
5KB
-
MD5
501ae6ccc10518430bd0d6e1ccea179f
-
SHA1
ed72512d15bdf16b0fce37235843cf6eae576743
-
SHA256
fa1b6a3dfb396a6f2925f2f8d5d89885c5cbb7e9108d04158262d9af25dcd71b
-
SHA512
735e972b9aa6e28f669192eaf8c4281ee76453fd17accd9be48c145e4bdb63231adfc6a8c489c7dd4e1e925d034177e986a6a25630987ad95714e74d6c2776e7
-
SSDEEP
48:iVhqxMNE2CPj4GDuXnVbwFTENgFOmrDX0Y0tIypFWPvyXsfn8UnkphVhwPcrX1CT:W/e2Cr4jbSG+0Ht1pFWXf8eAla
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2532 3068 rundll32.exe 30 PID 3068 wrote to memory of 2532 3068 rundll32.exe 30 PID 3068 wrote to memory of 2532 3068 rundll32.exe 30 PID 3068 wrote to memory of 2532 3068 rundll32.exe 30 PID 3068 wrote to memory of 2532 3068 rundll32.exe 30 PID 3068 wrote to memory of 2532 3068 rundll32.exe 30 PID 3068 wrote to memory of 2532 3068 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$TEMP\R2RGLD2KG.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$TEMP\R2RGLD2KG.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2532
-