Analysis
-
max time kernel
92s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 23:44
Static task
static1
Behavioral task
behavioral1
Sample
7eb6880a7aa829fb775cb2c3202c61721fafb0f8314d6122d4da0bb47c90d182.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7eb6880a7aa829fb775cb2c3202c61721fafb0f8314d6122d4da0bb47c90d182.dll
Resource
win10v2004-20241007-en
General
-
Target
7eb6880a7aa829fb775cb2c3202c61721fafb0f8314d6122d4da0bb47c90d182.dll
-
Size
3KB
-
MD5
9862a787cc3058d941ccc18b07b67194
-
SHA1
4fe6554cdffc1ca657c1d2d96b3deaa0930eddc2
-
SHA256
7eb6880a7aa829fb775cb2c3202c61721fafb0f8314d6122d4da0bb47c90d182
-
SHA512
f047913f87c42a0517c129774f33abed76d08a370ee18363f99bec368cf5b3b2b67828fa92b048becee4e1f5d8e514dd18fad9b493874fb53ecefb8318aa36fc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2728 2312 rundll32.exe 83 PID 2312 wrote to memory of 2728 2312 rundll32.exe 83 PID 2312 wrote to memory of 2728 2312 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7eb6880a7aa829fb775cb2c3202c61721fafb0f8314d6122d4da0bb47c90d182.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7eb6880a7aa829fb775cb2c3202c61721fafb0f8314d6122d4da0bb47c90d182.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2728
-