Overview
overview
10Static
static
70b42c766b0...32.exe
windows7-x64
1011f9bb7186...6b.exe
windows7-x64
3childmoney.exe
windows7-x64
31c281ece6f...2a.exe
windows7-x64
332bb88fa59...4b.exe
windows7-x64
35056cbe553...3d.exe
windows7-x64
350e0f20cb3...69.exe
windows7-x64
657bbc27030...7b.exe
windows7-x64
365a84ff98e...02.exe
windows7-x64
106db6ac1ce8...be.exe
windows7-x64
1072745efc42...46.exe
windows7-x64
10751fb51baa...fe.exe
windows7-x64
1095e95a5be0...63.exe
windows7-x64
3a935725900...07.exe
windows7-x64
3c190931380...74.dll
windows7-x64
3dafc6c03ef...19.exe
windows7-x64
1e3c6c48ba7...87.exe
windows7-x64
10edbb453cc0...46.exe
windows7-x64
5f633e6f255...4b.exe
windows7-x64
fda537bc5e...ad.exe
windows7-x64
3Analysis
-
max time kernel
240s -
max time network
242s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03-11-2024 19:18
Behavioral task
behavioral1
Sample
0b42c766b056ee3a04b2e0b833c4f42e1520516e047330df3c5640dfcc492232.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
11f9bb7186adbefb2633904f1626b20f3f8d0d3ecb98e55a3a81e6a17039786b.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
childmoney.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
1c281ece6f6be8983f6f858636ddf9169dcb00ec2c0a98d0797bf8d3619cb22a.exe
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
32bb88fa592ba0f338d58730d224728823684134157afe5892f5bbd8c042d54b.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
5056cbe5539d0e171c81451306f2a970b43a6039dd847316a96f24be7b19453d.exe
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
50e0f20cb3844c6b0ddc4af01daf274b7ebdddd0d322f06f05b7d6fec7c16869.exe
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
57bbc27030a7c47b62aa08d6d05b6c7eee36010246260924ed6b85ff7e53917b.exe
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
65a84ff98e09a002d01b1c2935ca603125c8ddcb5c5824da9cc60787594a5202.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
6db6ac1ce8f946e0b441c1a1be1b0f094cef331231ae4f9d58b30e3e353145be.exe
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
72745efc423d4adb76434360755cfbc3cfe8fa47ba8e5fa2920ada7dc9ceb146.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
751fb51baa5a4ed44c9c2bb45b824831914025e87d4d866e5861a38f734d8bfe.exe
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
95e95a5be0b57cee969c5d9f616be2e973bc08a77482c75570936faaaaa35063.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
a935725900d1ad19b92bcda1c0d612bccccd8bba53dd6e13cabe6d59d7874607.exe
Resource
win7-20241010-en
Behavioral task
behavioral15
Sample
c19093138028ea6a6a6665e270c36558757931f1d7f6f88910b08e39903a1774.dll
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
dafc6c03ef671f66ddbe47e6eee600d2dfa894eee1c1b67d51d3a24532f58e19.exe
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
e3c6c48ba7d213e5c5c31f43d70dc4ca1709fc29e06883f64487ad049a520b87.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
edbb453cc08e8ac79d0c60c0f1ca3803060e8c3a4dd2e2a7b40c50ec3fb0dd46.exe
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
f633e6f25507a6d99ad2474ca4528ef4fdf8f124cade2daa51d310733a62114b.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
fda537bc5e4051c8c69491089041df58483e31f410f180c5767901a53a67f9ad.exe
Resource
win7-20240903-en
General
-
Target
c19093138028ea6a6a6665e270c36558757931f1d7f6f88910b08e39903a1774.dll
-
Size
66KB
-
MD5
682e2024a229429202cb86dff22c7564
-
SHA1
adffba9e3b0f2f387b9b43793f274aa102df981f
-
SHA256
c19093138028ea6a6a6665e270c36558757931f1d7f6f88910b08e39903a1774
-
SHA512
289fdfd7d1e6ff58af8a07df117a93b86777e4a9b4e68c1406a43f85de7ea22be7511795a569b47d790289d8c8e7cc98f64e2f679819009d9293e5d03575ccd7
-
SSDEEP
1536:iuDxWf9xmOPtwwJcx1BFTor3TE6ReTL0n63huKwX:iusfmSUxC3tRQ0n62X
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1520 wrote to memory of 2328 1520 rundll32.exe 30 PID 1520 wrote to memory of 2328 1520 rundll32.exe 30 PID 1520 wrote to memory of 2328 1520 rundll32.exe 30 PID 1520 wrote to memory of 2328 1520 rundll32.exe 30 PID 1520 wrote to memory of 2328 1520 rundll32.exe 30 PID 1520 wrote to memory of 2328 1520 rundll32.exe 30 PID 1520 wrote to memory of 2328 1520 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c19093138028ea6a6a6665e270c36558757931f1d7f6f88910b08e39903a1774.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c19093138028ea6a6a6665e270c36558757931f1d7f6f88910b08e39903a1774.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2328
-