Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-10-2024 04:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
lpdsvc.dll
Resource
win7-20240903-en
windows7-x64
2 signatures
120 seconds
Behavioral task
behavioral2
Sample
lpdsvc.dll
Resource
win10v2004-20240802-en
windows10-2004-x64
2 signatures
120 seconds
General
-
Target
lpdsvc.dll
-
Size
22KB
-
MD5
1b02c185a148f88fc1f1d3e3ba581ccb
-
SHA1
9ffb9f9fe40faa7fe048bba6db9595c40c956899
-
SHA256
1e2be40fe405dcdc58e8fa96cf33ac2d2bd59129be8bef6931695584324afbcc
-
SHA512
94aa51bffa9b5fc6da3cc860ad91307ea4bac203936614d926f8bd16a8b3f96d84ecd1fc76334c8da68e5236c0f1840bdfa61ca4fd8fa75a942dd575f2d1d343
-
SSDEEP
384:UQ39xlaGxG6b0V5ejAYeb/t5FbQSjiSIur0sPqLLMY/sMzWYsFWV:99HtxJ+ejHa9iSIsPax/0c
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1756 wrote to memory of 696 1756 rundll32.exe 29 PID 1756 wrote to memory of 696 1756 rundll32.exe 29 PID 1756 wrote to memory of 696 1756 rundll32.exe 29 PID 1756 wrote to memory of 696 1756 rundll32.exe 29 PID 1756 wrote to memory of 696 1756 rundll32.exe 29 PID 1756 wrote to memory of 696 1756 rundll32.exe 29 PID 1756 wrote to memory of 696 1756 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\lpdsvc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\lpdsvc.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:696
-