Analysis
-
max time kernel
140s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 01:08
Static task
static1
Behavioral task
behavioral1
Sample
1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127.dll
Resource
win7-20240903-en
General
-
Target
1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127.dll
-
Size
655KB
-
MD5
7cbf2951f13cd54abd951b1d289e2655
-
SHA1
d345e1d251714508a28544dc00e5950b05116ce1
-
SHA256
1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127
-
SHA512
773cc4fdf347454181173305ac5df67ed829f918411d3234ad4be33a6f2cf6fd142ef9c64ab18ac2fba64acf29b667f17ba1d3b4fc8fad39c9c0f2c580e45652
-
SSDEEP
12288:5VM1TXEY93cdWFnQyS94SjU3u8nTef/TUKo9vy0lg3BJhRbignDYy+z:jMJ0Y6dWJQyS/jj8nTefLUKEyGK/PMr
Malware Config
Extracted
systembc
38.132.122.161:443
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 2 2136 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2136 2384 rundll32.exe 31 PID 2384 wrote to memory of 2136 2384 rundll32.exe 31 PID 2384 wrote to memory of 2136 2384 rundll32.exe 31 PID 2384 wrote to memory of 2136 2384 rundll32.exe 31 PID 2384 wrote to memory of 2136 2384 rundll32.exe 31 PID 2384 wrote to memory of 2136 2384 rundll32.exe 31 PID 2384 wrote to memory of 2136 2384 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2136
-