Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 09:20
Static task
static1
Behavioral task
behavioral1
Sample
9f373f4c90bddf8a4c2cc00046f97388a4cc19a6f350b0cf3dc713ff5365d106N.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9f373f4c90bddf8a4c2cc00046f97388a4cc19a6f350b0cf3dc713ff5365d106N.dll
Resource
win10v2004-20241007-en
General
-
Target
9f373f4c90bddf8a4c2cc00046f97388a4cc19a6f350b0cf3dc713ff5365d106N.dll
-
Size
350KB
-
MD5
dcd2ab08fb738a4fde9b9aabfedb0190
-
SHA1
6ce80ca582d1dea824f1879acebc805247666dca
-
SHA256
9f373f4c90bddf8a4c2cc00046f97388a4cc19a6f350b0cf3dc713ff5365d106
-
SHA512
9e273ba186f224785410029ef0514608b909d164921a3ca487cc53a972203d93cd259f37b37935a02b0c386546e792971a8281a5ca00f1e90960599560ac336c
-
SSDEEP
6144:O/Y8cSQMqiFj+1x2dvASvNeOmbXpnrxYOTupOpcfYfcLH3pudfZ:OQ8cSLqil+6dDATbXF1YOTEycw28B
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2972 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2972 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2972 2968 rundll32.exe 31 PID 2968 wrote to memory of 2972 2968 rundll32.exe 31 PID 2968 wrote to memory of 2972 2968 rundll32.exe 31 PID 2968 wrote to memory of 2972 2968 rundll32.exe 31 PID 2968 wrote to memory of 2972 2968 rundll32.exe 31 PID 2968 wrote to memory of 2972 2968 rundll32.exe 31 PID 2968 wrote to memory of 2972 2968 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9f373f4c90bddf8a4c2cc00046f97388a4cc19a6f350b0cf3dc713ff5365d106N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9f373f4c90bddf8a4c2cc00046f97388a4cc19a6f350b0cf3dc713ff5365d106N.dll,#12⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:2972
-