Overview
overview
7Static
static
7Cadt.dll
windows7-x64
5Cadt.dll
windows10-2004-x64
5DisView.exe
windows7-x64
5DisView.exe
windows10-2004-x64
5LZNT1Decompress.dll
windows7-x64
3LZNT1Decompress.dll
windows10-2004-x64
3MalHost-Setup.exe
windows7-x64
3MalHost-Setup.exe
windows10-2004-x64
3OfficeMalScanner.exe
windows7-x64
5OfficeMalScanner.exe
windows10-2004-x64
5RTFScan.exe
windows7-x64
5RTFScan.exe
windows10-2004-x64
5Unzipper.dll
windows7-x64
5Unzipper.dll
windows10-2004-x64
5Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2024, 20:46
Behavioral task
behavioral1
Sample
Cadt.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Cadt.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
DisView.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
DisView.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
LZNT1Decompress.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
LZNT1Decompress.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
MalHost-Setup.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
MalHost-Setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
OfficeMalScanner.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
OfficeMalScanner.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
RTFScan.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
RTFScan.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Unzipper.dll
Resource
win7-20240903-en
General
-
Target
LZNT1Decompress.dll
-
Size
8KB
-
MD5
cc8d70fcc8de6b6bbf96c47588699bb4
-
SHA1
602e3925f173925a1ba84cd82504f4d7a99148f8
-
SHA256
a552b12a3b65c42915ae1b616f2112fe33739ad332756ecb0a6e579318ed1699
-
SHA512
939eacaf746ec216abc3223b8107e3523eabe0fdbce70091e80f6ac3bb6b29479d9315a0a26332f40491684039220c12ae31cbda39b96d3f3992734aa94d78b2
-
SSDEEP
192:VnHiklh6n1AIToTnN0TNEdv8JAITIb/k:V7AAIoCKd8JO
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3268 wrote to memory of 4940 3268 rundll32.exe 83 PID 3268 wrote to memory of 4940 3268 rundll32.exe 83 PID 3268 wrote to memory of 4940 3268 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\LZNT1Decompress.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\LZNT1Decompress.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4940
-