Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
02-11-2024 06:20
Behavioral task
behavioral1
Sample
e3fae5a39876e4e3e4d8b814f11547a08cb49341fd47a3a3d25291d042b5515f.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e3fae5a39876e4e3e4d8b814f11547a08cb49341fd47a3a3d25291d042b5515f.dll
Resource
win10v2004-20241007-en
General
-
Target
e3fae5a39876e4e3e4d8b814f11547a08cb49341fd47a3a3d25291d042b5515f.dll
-
Size
76KB
-
MD5
fc46ed2962547a4258a7f17951b8084a
-
SHA1
a0f9f2a677736e899ea5cf80bf885949afa14e7e
-
SHA256
e3fae5a39876e4e3e4d8b814f11547a08cb49341fd47a3a3d25291d042b5515f
-
SHA512
7dab52b4c32a50d71c459d9435058c170d5bb948f89c6f37b8f3eadc0ea0f7d1aa50965422f14a448ad2d1d959e5c765d2a87a59a03dcb3dcdbbe88d2cacf825
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7Zbzbj:c8y93KQjy7G55riF1cMo039bj
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2780-2-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2780-1-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2780-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2780-3-0x0000000010000000-0x0000000010030000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
rundll32.exepid process 2780 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
rundll32.exedescription pid process Token: SeDebugPrivilege 2780 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2956 wrote to memory of 2780 2956 rundll32.exe rundll32.exe PID 2956 wrote to memory of 2780 2956 rundll32.exe rundll32.exe PID 2956 wrote to memory of 2780 2956 rundll32.exe rundll32.exe PID 2956 wrote to memory of 2780 2956 rundll32.exe rundll32.exe PID 2956 wrote to memory of 2780 2956 rundll32.exe rundll32.exe PID 2956 wrote to memory of 2780 2956 rundll32.exe rundll32.exe PID 2956 wrote to memory of 2780 2956 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e3fae5a39876e4e3e4d8b814f11547a08cb49341fd47a3a3d25291d042b5515f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e3fae5a39876e4e3e4d8b814f11547a08cb49341fd47a3a3d25291d042b5515f.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2780