Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 09:33
Static task
static1
Behavioral task
behavioral1
Sample
1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127.dll
Resource
win7-20240708-en
General
-
Target
1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127.dll
-
Size
655KB
-
MD5
7cbf2951f13cd54abd951b1d289e2655
-
SHA1
d345e1d251714508a28544dc00e5950b05116ce1
-
SHA256
1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127
-
SHA512
773cc4fdf347454181173305ac5df67ed829f918411d3234ad4be33a6f2cf6fd142ef9c64ab18ac2fba64acf29b667f17ba1d3b4fc8fad39c9c0f2c580e45652
-
SSDEEP
12288:5VM1TXEY93cdWFnQyS94SjU3u8nTef/TUKo9vy0lg3BJhRbignDYy+z:jMJ0Y6dWJQyS/jj8nTefLUKEyGK/PMr
Malware Config
Extracted
systembc
38.132.122.161:443
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 2 2112 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1680 wrote to memory of 2112 1680 rundll32.exe rundll32.exe PID 1680 wrote to memory of 2112 1680 rundll32.exe rundll32.exe PID 1680 wrote to memory of 2112 1680 rundll32.exe rundll32.exe PID 1680 wrote to memory of 2112 1680 rundll32.exe rundll32.exe PID 1680 wrote to memory of 2112 1680 rundll32.exe rundll32.exe PID 1680 wrote to memory of 2112 1680 rundll32.exe rundll32.exe PID 1680 wrote to memory of 2112 1680 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2112
-