Analysis
-
max time kernel
104s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 08:17
Behavioral task
behavioral1
Sample
a2c40a2b31c6ccff9df8417b906eb707ca7ae3aa2a12a2290b7cf3a7fae89235N.dll
Resource
win7-20240903-en
3 signatures
120 seconds
General
-
Target
a2c40a2b31c6ccff9df8417b906eb707ca7ae3aa2a12a2290b7cf3a7fae89235N.dll
-
Size
103KB
-
MD5
fc1ef84e1d51746ff7b627c08a8ef2f0
-
SHA1
4c85be258903126fd1b0b0b0199b80a1eec9a28b
-
SHA256
a2c40a2b31c6ccff9df8417b906eb707ca7ae3aa2a12a2290b7cf3a7fae89235
-
SHA512
f06d4d35d5c34f59817643e662a4452fb750d7efdbea0b6abd5ed2c306f5d5be3d2f942ec49fa792a4268edb31da1a20754f526d6395746a70c03eebf08fdd03
-
SSDEEP
3072:03/KeW8V3rQsF7o3cOX2CKeiATn3pIPdgJ8Jj:03/b3r7OX2ChjTn3pMgJ8Jj
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2300-3-0x0000000010000000-0x000000001000E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2300 1640 rundll32.exe 30 PID 1640 wrote to memory of 2300 1640 rundll32.exe 30 PID 1640 wrote to memory of 2300 1640 rundll32.exe 30 PID 1640 wrote to memory of 2300 1640 rundll32.exe 30 PID 1640 wrote to memory of 2300 1640 rundll32.exe 30 PID 1640 wrote to memory of 2300 1640 rundll32.exe 30 PID 1640 wrote to memory of 2300 1640 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a2c40a2b31c6ccff9df8417b906eb707ca7ae3aa2a12a2290b7cf3a7fae89235N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a2c40a2b31c6ccff9df8417b906eb707ca7ae3aa2a12a2290b7cf3a7fae89235N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2300
-