Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 13:33
Behavioral task
behavioral1
Sample
74e03fdcbadc7c307c4749bb15e190ff4e16074a8c76251689ae2b89acbdea92N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
74e03fdcbadc7c307c4749bb15e190ff4e16074a8c76251689ae2b89acbdea92N.dll
Resource
win10v2004-20241007-en
General
-
Target
74e03fdcbadc7c307c4749bb15e190ff4e16074a8c76251689ae2b89acbdea92N.dll
-
Size
7.0MB
-
MD5
cf57b6e9abed2137c94cb605beee12d0
-
SHA1
c16433dc4c4410cb27dbfc736479e7bb9b413915
-
SHA256
74e03fdcbadc7c307c4749bb15e190ff4e16074a8c76251689ae2b89acbdea92
-
SHA512
9de87f8d7981321f4242eb2cabb4421a1faa99b733133e19c552e1941a25316a23faee7832dccdab14d9044857f7f0decba225bbdcb0dc8ff4324cfc3bdcd506
-
SSDEEP
98304:hI6Et6igJNGWQDLASFYT636Day5GFSUjk5nFbFF2vxTe31UnmpihRA/9l9+Y:a6u6XrQDLASFY46DHG8zVmxJnAck6Y
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2788 2756 rundll32.exe 31 PID 2756 wrote to memory of 2788 2756 rundll32.exe 31 PID 2756 wrote to memory of 2788 2756 rundll32.exe 31 PID 2756 wrote to memory of 2788 2756 rundll32.exe 31 PID 2756 wrote to memory of 2788 2756 rundll32.exe 31 PID 2756 wrote to memory of 2788 2756 rundll32.exe 31 PID 2756 wrote to memory of 2788 2756 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\74e03fdcbadc7c307c4749bb15e190ff4e16074a8c76251689ae2b89acbdea92N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\74e03fdcbadc7c307c4749bb15e190ff4e16074a8c76251689ae2b89acbdea92N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2788
-