Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 02:18
Static task
static1
Behavioral task
behavioral1
Sample
f02f2db409eaaf08f80400954e70af3b32342089a52b57401b734b9355d18b02N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f02f2db409eaaf08f80400954e70af3b32342089a52b57401b734b9355d18b02N.dll
Resource
win10v2004-20241007-en
General
-
Target
f02f2db409eaaf08f80400954e70af3b32342089a52b57401b734b9355d18b02N.dll
-
Size
6KB
-
MD5
774d6834273f4df693a37ffcf7053060
-
SHA1
f5a896a352a20cc720b620720a4c05c659ac9d63
-
SHA256
f02f2db409eaaf08f80400954e70af3b32342089a52b57401b734b9355d18b02
-
SHA512
0de9c7c048e42b2c2db6551a21aca217bf18797708768d9b7039c6ea6d688870698dcf1715f4346d25bdffa45f31337d6ec9c5df7cfd1cac09dc3b8c9bcb2d80
-
SSDEEP
48:6EQt5YVOSVVEPy+wEMmqiHNpU10lB+BDq9J5SV3DY:CSVVEPozmB7nB+FqX5S1D
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2260 2960 rundll32.exe 30 PID 2960 wrote to memory of 2260 2960 rundll32.exe 30 PID 2960 wrote to memory of 2260 2960 rundll32.exe 30 PID 2960 wrote to memory of 2260 2960 rundll32.exe 30 PID 2960 wrote to memory of 2260 2960 rundll32.exe 30 PID 2960 wrote to memory of 2260 2960 rundll32.exe 30 PID 2960 wrote to memory of 2260 2960 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f02f2db409eaaf08f80400954e70af3b32342089a52b57401b734b9355d18b02N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f02f2db409eaaf08f80400954e70af3b32342089a52b57401b734b9355d18b02N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2260
-