Analysis
-
max time kernel
84s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:23
Static task
static1
Behavioral task
behavioral1
Sample
8b5220a1f42d505e82def0ad15f3f21714c4a3951f20f01c85732166dc578cdcN.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8b5220a1f42d505e82def0ad15f3f21714c4a3951f20f01c85732166dc578cdcN.dll
Resource
win10v2004-20240802-en
General
-
Target
8b5220a1f42d505e82def0ad15f3f21714c4a3951f20f01c85732166dc578cdcN.dll
-
Size
64KB
-
MD5
ef97ca9bdd5f9c1742e63432c176afb0
-
SHA1
74d00cc632114873b56436f6f871940d8a0b937c
-
SHA256
8b5220a1f42d505e82def0ad15f3f21714c4a3951f20f01c85732166dc578cdc
-
SHA512
09f02773c2356b4ef21faddc76d0764f13188b90938f59e410ec9d2c67990ccf4884ac186ef37739605c42b15bbfb04be131c20ea8ed6757c4686255129d8bce
-
SSDEEP
1536:7Sa0lntIOS7T1cAhX/SYXsZ3UxKxdECFDpK:ea0wOWT1cgXuk2hFDpK
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\nuloraku.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\hikodena rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2744 rundll32.exe 2744 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2744 2664 rundll32.exe 31 PID 2664 wrote to memory of 2744 2664 rundll32.exe 31 PID 2664 wrote to memory of 2744 2664 rundll32.exe 31 PID 2664 wrote to memory of 2744 2664 rundll32.exe 31 PID 2664 wrote to memory of 2744 2664 rundll32.exe 31 PID 2664 wrote to memory of 2744 2664 rundll32.exe 31 PID 2664 wrote to memory of 2744 2664 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8b5220a1f42d505e82def0ad15f3f21714c4a3951f20f01c85732166dc578cdcN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8b5220a1f42d505e82def0ad15f3f21714c4a3951f20f01c85732166dc578cdcN.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2744
-