Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 23:24
Static task
static1
Behavioral task
behavioral1
Sample
6e9db3fa118aba13ffbb42df584df1a1418c984985d032a7655eee82234be581.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
6e9db3fa118aba13ffbb42df584df1a1418c984985d032a7655eee82234be581.dll
Resource
win10v2004-20241007-en
General
-
Target
6e9db3fa118aba13ffbb42df584df1a1418c984985d032a7655eee82234be581.dll
-
Size
5KB
-
MD5
9a41d62d32e4ed4630db9c4f4316e900
-
SHA1
73129af219cb0f5a020dad1da0bce2c6957085bb
-
SHA256
6e9db3fa118aba13ffbb42df584df1a1418c984985d032a7655eee82234be581
-
SHA512
fdb672b872d41c107b913dc6be1621ae24445f4287f0bbf4632fdf8f1bb4fe3c07d036845f5cf839e92e14464056cc4fe3bc42c83a5af9c7b5f3e80dd87c65f8
-
SSDEEP
96:hy859x0P8Mava/X01t15U50Lmt9dMqUlmC:F5oLFGHg0LYdzg
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 320 wrote to memory of 2544 320 rundll32.exe 29 PID 320 wrote to memory of 2544 320 rundll32.exe 29 PID 320 wrote to memory of 2544 320 rundll32.exe 29 PID 320 wrote to memory of 2544 320 rundll32.exe 29 PID 320 wrote to memory of 2544 320 rundll32.exe 29 PID 320 wrote to memory of 2544 320 rundll32.exe 29 PID 320 wrote to memory of 2544 320 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6e9db3fa118aba13ffbb42df584df1a1418c984985d032a7655eee82234be581.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6e9db3fa118aba13ffbb42df584df1a1418c984985d032a7655eee82234be581.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2544
-