Overview
overview
7Static
static
7Cadt.dll
windows7-x64
5Cadt.dll
windows10-2004-x64
5DisView.exe
windows7-x64
5DisView.exe
windows10-2004-x64
5LZNT1Decompress.dll
windows7-x64
3LZNT1Decompress.dll
windows10-2004-x64
3MalHost-Setup.exe
windows7-x64
3MalHost-Setup.exe
windows10-2004-x64
3OfficeMalScanner.exe
windows7-x64
5OfficeMalScanner.exe
windows10-2004-x64
5RTFScan.exe
windows7-x64
5RTFScan.exe
windows10-2004-x64
5Unzipper.dll
windows7-x64
5Unzipper.dll
windows10-2004-x64
5Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/10/2024, 20:46
Behavioral task
behavioral1
Sample
Cadt.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Cadt.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
DisView.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
DisView.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
LZNT1Decompress.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
LZNT1Decompress.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
MalHost-Setup.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
MalHost-Setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
OfficeMalScanner.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
OfficeMalScanner.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
RTFScan.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
RTFScan.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Unzipper.dll
Resource
win7-20240903-en
General
-
Target
Unzipper.dll
-
Size
11KB
-
MD5
cfd39c43a7cd8b92fd003a112dd37d0f
-
SHA1
27a5895045755be9dc88fb9845d3f62a2d883906
-
SHA256
0d82d5119894ffa028041c07b11a0a6a787612407325b2d7cabb4d58ec5e94f4
-
SHA512
e2e002d0301e762f342b71fe63e0917dbd320eb388fb323b5881140af1e6b39d6a1a31c2d474c61357286d36a973edc453f9912ec670122c89f719ebeba3da61
-
SSDEEP
192:Cm+SHL24GgPoby3NRUog/O/gjho2aK3Mlg7Q8epu4NQjHRlVD6:D+uk6omLgjraKsS6uZlVm
Malware Config
Signatures
-
resource yara_rule behavioral13/memory/2684-1-0x0000000065E80000-0x0000000065E8F000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2684 2540 rundll32.exe 30 PID 2540 wrote to memory of 2684 2540 rundll32.exe 30 PID 2540 wrote to memory of 2684 2540 rundll32.exe 30 PID 2540 wrote to memory of 2684 2540 rundll32.exe 30 PID 2540 wrote to memory of 2684 2540 rundll32.exe 30 PID 2540 wrote to memory of 2684 2540 rundll32.exe 30 PID 2540 wrote to memory of 2684 2540 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Unzipper.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Unzipper.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2684
-