Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 04:09
Static task
static1
Behavioral task
behavioral1
Sample
73a5da7d681d3eb6dbf321781e1ca7988638182a71066f70742aee0655c5553fN.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
73a5da7d681d3eb6dbf321781e1ca7988638182a71066f70742aee0655c5553fN.dll
Resource
win10v2004-20240802-en
General
-
Target
73a5da7d681d3eb6dbf321781e1ca7988638182a71066f70742aee0655c5553fN.dll
-
Size
6KB
-
MD5
fae1d9aab3a40b01caf6e13bb9d489c0
-
SHA1
8e0c72f6bdd40083a5625f0bd123fbd643875ad0
-
SHA256
73a5da7d681d3eb6dbf321781e1ca7988638182a71066f70742aee0655c5553f
-
SHA512
b3a9d3cee12ad0b77617b1d2b86d1c0616f71356cef0fbd05fdf9b810a9c7a47f0a07dfd5d0257e54b6b49c3e7047eba4f634610a1c0e31255ad600b880b4eb7
-
SSDEEP
96:hy859x0P8Mav5wGP+n8xNg+63NbX8ee+OjeGx4Is2HWG:F5oLA52MNp634xvWG
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2420 2080 rundll32.exe 30 PID 2080 wrote to memory of 2420 2080 rundll32.exe 30 PID 2080 wrote to memory of 2420 2080 rundll32.exe 30 PID 2080 wrote to memory of 2420 2080 rundll32.exe 30 PID 2080 wrote to memory of 2420 2080 rundll32.exe 30 PID 2080 wrote to memory of 2420 2080 rundll32.exe 30 PID 2080 wrote to memory of 2420 2080 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\73a5da7d681d3eb6dbf321781e1ca7988638182a71066f70742aee0655c5553fN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\73a5da7d681d3eb6dbf321781e1ca7988638182a71066f70742aee0655c5553fN.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2420
-