Analysis
-
max time kernel
119s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-10-2024 16:11
Static task
static1
Behavioral task
behavioral1
Sample
a123deffb8654dfeef769b79fa04d38807603a82d8826fda8ee3db2c1f474ca2N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a123deffb8654dfeef769b79fa04d38807603a82d8826fda8ee3db2c1f474ca2N.dll
Resource
win10v2004-20241007-en
General
-
Target
a123deffb8654dfeef769b79fa04d38807603a82d8826fda8ee3db2c1f474ca2N.dll
-
Size
6KB
-
MD5
ccaf4dbdce2c0d681157d7e0469eb3c0
-
SHA1
01446ada6031fd317b9c13fb7a7a065e6180ac56
-
SHA256
a123deffb8654dfeef769b79fa04d38807603a82d8826fda8ee3db2c1f474ca2
-
SHA512
dc24fa562c084967b40a3dbf604cced61867f7e4a21b9d43991a302a2654e33b0357452ea03bd32c977b5896819de1da6fc6becaa91e64f6069596693ceb6616
-
SSDEEP
96:hy859x0P8MaIhBffokBpwzT2POnWe2gKeXU51:F5oLLzfoEwzCO5Q51
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2776 2764 rundll32.exe 30 PID 2764 wrote to memory of 2776 2764 rundll32.exe 30 PID 2764 wrote to memory of 2776 2764 rundll32.exe 30 PID 2764 wrote to memory of 2776 2764 rundll32.exe 30 PID 2764 wrote to memory of 2776 2764 rundll32.exe 30 PID 2764 wrote to memory of 2776 2764 rundll32.exe 30 PID 2764 wrote to memory of 2776 2764 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a123deffb8654dfeef769b79fa04d38807603a82d8826fda8ee3db2c1f474ca2N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a123deffb8654dfeef769b79fa04d38807603a82d8826fda8ee3db2c1f474ca2N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2776
-