Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 04:07
Static task
static1
Behavioral task
behavioral1
Sample
9552f49c715c9990a10dd1cb17a66f8bbd628bcbfa0178f87cff9387d26b12e9.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9552f49c715c9990a10dd1cb17a66f8bbd628bcbfa0178f87cff9387d26b12e9.dll
Resource
win10v2004-20241007-en
General
-
Target
9552f49c715c9990a10dd1cb17a66f8bbd628bcbfa0178f87cff9387d26b12e9.dll
-
Size
122KB
-
MD5
4b5a8ef4e6a3d754390b451577234ff2
-
SHA1
bcab0577b133bcadc2f91260b8eebc5829d7659c
-
SHA256
9552f49c715c9990a10dd1cb17a66f8bbd628bcbfa0178f87cff9387d26b12e9
-
SHA512
959e49e0fc7cadcf6410ffddba59d307064632dc6535975770eac94c0321643c0022cfd3535c6d708ea48d26fd0dd21b712f1b09838ce389c262bf49d0a0a966
-
SSDEEP
1536:HPv36kLBV1kzspHvjHTAN1qozoFQkKGdAz/PbojTPLMNMn7fX:HPv3rBUzOgN1qDdU/PWTz5b
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2160 2644 rundll32.exe 30 PID 2644 wrote to memory of 2160 2644 rundll32.exe 30 PID 2644 wrote to memory of 2160 2644 rundll32.exe 30 PID 2644 wrote to memory of 2160 2644 rundll32.exe 30 PID 2644 wrote to memory of 2160 2644 rundll32.exe 30 PID 2644 wrote to memory of 2160 2644 rundll32.exe 30 PID 2644 wrote to memory of 2160 2644 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9552f49c715c9990a10dd1cb17a66f8bbd628bcbfa0178f87cff9387d26b12e9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9552f49c715c9990a10dd1cb17a66f8bbd628bcbfa0178f87cff9387d26b12e9.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2160
-