Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 06:37
Static task
static1
Behavioral task
behavioral1
Sample
7d1533bc05d36815783cee64b3c4cfd6ddfb9d6787adabcd472aec8902d855aaN.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7d1533bc05d36815783cee64b3c4cfd6ddfb9d6787adabcd472aec8902d855aaN.dll
Resource
win10v2004-20240802-en
General
-
Target
7d1533bc05d36815783cee64b3c4cfd6ddfb9d6787adabcd472aec8902d855aaN.dll
-
Size
6KB
-
MD5
3bbb2ffeea78234d7d20719f042d9a10
-
SHA1
0217ffd66514f927f44609ef38d98e060c9ad223
-
SHA256
7d1533bc05d36815783cee64b3c4cfd6ddfb9d6787adabcd472aec8902d855aa
-
SHA512
e8512908d2ecbed7bb5795f4915cfa19599100a68f2ed7d6d576ee19bdeb1a2b3e5d70b9480d0c19295905d958891034601178000db6dee4c51d978fdd47e50c
-
SSDEEP
48:63mll5YVOa9VUX1iwbQWu0PcB+BDq9J5SH:VDa9VUX9bQWvcB+FqX5SH
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2528 2388 rundll32.exe 30 PID 2388 wrote to memory of 2528 2388 rundll32.exe 30 PID 2388 wrote to memory of 2528 2388 rundll32.exe 30 PID 2388 wrote to memory of 2528 2388 rundll32.exe 30 PID 2388 wrote to memory of 2528 2388 rundll32.exe 30 PID 2388 wrote to memory of 2528 2388 rundll32.exe 30 PID 2388 wrote to memory of 2528 2388 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7d1533bc05d36815783cee64b3c4cfd6ddfb9d6787adabcd472aec8902d855aaN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7d1533bc05d36815783cee64b3c4cfd6ddfb9d6787adabcd472aec8902d855aaN.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2528
-