Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-10-2024 23:00
Static task
static1
Behavioral task
behavioral1
Sample
6b037f5e5d25aa075ca584773e1c855ffcd14c0dd8634027e1900231d2762f6cN.dll
Resource
win7-20240903-en
General
-
Target
6b037f5e5d25aa075ca584773e1c855ffcd14c0dd8634027e1900231d2762f6cN.dll
-
Size
869KB
-
MD5
ce633228dbc41885e4f1b2c79dd3ca90
-
SHA1
3e8138ac9a63e0a5ebd2f70c296a1596f81f81d3
-
SHA256
6b037f5e5d25aa075ca584773e1c855ffcd14c0dd8634027e1900231d2762f6c
-
SHA512
63d372f6b3cc96c6cdece26dad6d4cbb5d13e7b911221727aed4b9c7a6d3ea80c20077e4170751df8ed550046a2315d0d41cb3d506fb4a2c88d0cb16ceb746f2
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0Q:jDgtfRQUHPw06MoV2nwTBlhm8Y
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1708 wrote to memory of 1924 1708 rundll32.exe rundll32.exe PID 1708 wrote to memory of 1924 1708 rundll32.exe rundll32.exe PID 1708 wrote to memory of 1924 1708 rundll32.exe rundll32.exe PID 1708 wrote to memory of 1924 1708 rundll32.exe rundll32.exe PID 1708 wrote to memory of 1924 1708 rundll32.exe rundll32.exe PID 1708 wrote to memory of 1924 1708 rundll32.exe rundll32.exe PID 1708 wrote to memory of 1924 1708 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6b037f5e5d25aa075ca584773e1c855ffcd14c0dd8634027e1900231d2762f6cN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6b037f5e5d25aa075ca584773e1c855ffcd14c0dd8634027e1900231d2762f6cN.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1924
-