Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-10-2024 01:55
Static task
static1
Behavioral task
behavioral1
Sample
6d479a078d704ddc704a041b7ce9b8ba6605daee2fe8c189b03ecba3082ec3aa.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6d479a078d704ddc704a041b7ce9b8ba6605daee2fe8c189b03ecba3082ec3aa.dll
Resource
win10v2004-20240802-en
General
-
Target
6d479a078d704ddc704a041b7ce9b8ba6605daee2fe8c189b03ecba3082ec3aa.dll
-
Size
5.0MB
-
MD5
172d7611ef5729145d0cbb12d4469c3a
-
SHA1
2ab1c3f45c2f50f7b310c8999108b3242602dab2
-
SHA256
6d479a078d704ddc704a041b7ce9b8ba6605daee2fe8c189b03ecba3082ec3aa
-
SHA512
efb27a40cbf5a2cb552a21c087df8e46cba8b950b9d6c29b97d93df55c3050c4f93e4b2b2ec010d5e2147ab19353ad5aad265901a6aa0c44ee401fd529ffee85
-
SSDEEP
98304:NAsEYEajp/ctUC88go4sbawiMIP903gy7:NYYEajp/688TzLIGz
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2320 2060 rundll32.exe 31 PID 2060 wrote to memory of 2320 2060 rundll32.exe 31 PID 2060 wrote to memory of 2320 2060 rundll32.exe 31 PID 2060 wrote to memory of 2320 2060 rundll32.exe 31 PID 2060 wrote to memory of 2320 2060 rundll32.exe 31 PID 2060 wrote to memory of 2320 2060 rundll32.exe 31 PID 2060 wrote to memory of 2320 2060 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6d479a078d704ddc704a041b7ce9b8ba6605daee2fe8c189b03ecba3082ec3aa.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6d479a078d704ddc704a041b7ce9b8ba6605daee2fe8c189b03ecba3082ec3aa.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2320
-