Overview
overview
7Static
static
7Cadt.dll
windows7-x64
5Cadt.dll
windows10-2004-x64
5DisView.exe
windows7-x64
5DisView.exe
windows10-2004-x64
5LZNT1Decompress.dll
windows7-x64
3LZNT1Decompress.dll
windows10-2004-x64
3MalHost-Setup.exe
windows7-x64
3MalHost-Setup.exe
windows10-2004-x64
3OfficeMalScanner.exe
windows7-x64
5OfficeMalScanner.exe
windows10-2004-x64
5RTFScan.exe
windows7-x64
5RTFScan.exe
windows10-2004-x64
5Unzipper.dll
windows7-x64
5Unzipper.dll
windows10-2004-x64
5Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2024, 20:46
Behavioral task
behavioral1
Sample
Cadt.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Cadt.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
DisView.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
DisView.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
LZNT1Decompress.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
LZNT1Decompress.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
MalHost-Setup.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
MalHost-Setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
OfficeMalScanner.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
OfficeMalScanner.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
RTFScan.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
RTFScan.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Unzipper.dll
Resource
win7-20240903-en
General
-
Target
Cadt.dll
-
Size
18KB
-
MD5
a32950525269db772ccdeec32e263d3b
-
SHA1
967ef6990f1cffb0d35fa769c24dfb19472190c7
-
SHA256
a49e7721e6b9adc134abbb01a35b19a4b2d41e5238fc0490acfa9505f29525ac
-
SHA512
9443f9418cb614765f119f2127d7c4ab8bac28139b2d1405daaaaae2f3baf6ec42fef135955f31f6ebad5f49902c5d296566b7e7cbf25506f06635d383260172
-
SSDEEP
384:vvKy0f6VBGFmhcbNrxhgT8QfYGpzhdWJaP80jkoy7hPV:rIFeT8QDzhdTk0mlN
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4976-0-0x0000000000400000-0x0000000000412000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 436 wrote to memory of 4976 436 rundll32.exe 83 PID 436 wrote to memory of 4976 436 rundll32.exe 83 PID 436 wrote to memory of 4976 436 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Cadt.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Cadt.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4976
-