Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 15:10
Static task
static1
Behavioral task
behavioral1
Sample
e9bc3752fe4a396d88df5e416e9b80266a219dc33b9e54a61528a29c7e11dd16N.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e9bc3752fe4a396d88df5e416e9b80266a219dc33b9e54a61528a29c7e11dd16N.dll
Resource
win10v2004-20240802-en
General
-
Target
e9bc3752fe4a396d88df5e416e9b80266a219dc33b9e54a61528a29c7e11dd16N.dll
-
Size
11KB
-
MD5
95b0d726c1de095bcdd718cd81257160
-
SHA1
783d34e476bc23c9ca9c2a01fc5d591d1a941d1b
-
SHA256
e9bc3752fe4a396d88df5e416e9b80266a219dc33b9e54a61528a29c7e11dd16
-
SHA512
f4b16356c6fea6956209aa0a8c46df9e2dd38184b9555df20efec1a903e84d4538558b3be7de578a7fab36ab1acf28d47323cad5646606adcfae0cafd6bf56e5
-
SSDEEP
192:QBxhIjt7BC2dBFA5aMsismmsrBY3XpqkOqKE:QDhIhYj5aMsiuWoMNqKE
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2384 wrote to memory of 1720 2384 rundll32.exe 30 PID 2384 wrote to memory of 1720 2384 rundll32.exe 30 PID 2384 wrote to memory of 1720 2384 rundll32.exe 30 PID 2384 wrote to memory of 1720 2384 rundll32.exe 30 PID 2384 wrote to memory of 1720 2384 rundll32.exe 30 PID 2384 wrote to memory of 1720 2384 rundll32.exe 30 PID 2384 wrote to memory of 1720 2384 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e9bc3752fe4a396d88df5e416e9b80266a219dc33b9e54a61528a29c7e11dd16N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e9bc3752fe4a396d88df5e416e9b80266a219dc33b9e54a61528a29c7e11dd16N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1720
-