Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2024, 13:26
Static task
static1
Behavioral task
behavioral1
Sample
ElsTool.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ElsTool.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
ElsTool_hk.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
ElsTool_hk.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
fanshk.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
fanshk.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
qqaazz.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
qqaazz.dll
Resource
win10v2004-20241007-en
General
-
Target
qqaazz.dll
-
Size
152KB
-
MD5
4ab73448c1bab104b8b28d58d2c7b881
-
SHA1
d9b8eb891e02ba6471305c4d605dab5c1c6ed34e
-
SHA256
104d4e3e0be85e142dd6d577742c4a18b7e5b41456b23fdb3ff648a0bfd720b7
-
SHA512
2ca0e4e844bbcd5b8652b21d32ff2b2393dd9e32ad2863009649ea5db8597a69bd2d0fd430baaf59ff8cd5c1c0a5002567ece8c41d2bbd892157fd3427bc2846
-
SSDEEP
3072:iUw/tECUc5tZCF3GSNq1chIOHtzFikxklkgUPIydXPDCf:bwVQ3wWIONxik2OgUPEf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3680 wrote to memory of 316 3680 rundll32.exe 83 PID 3680 wrote to memory of 316 3680 rundll32.exe 83 PID 3680 wrote to memory of 316 3680 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\qqaazz.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\qqaazz.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:316
-