Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 12:51
Static task
static1
Behavioral task
behavioral1
Sample
389be347fe6a366e3175ddaac2d45ff34b3d361921b870610e7982166d6e1562N.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
389be347fe6a366e3175ddaac2d45ff34b3d361921b870610e7982166d6e1562N.dll
Resource
win10v2004-20241007-en
General
-
Target
389be347fe6a366e3175ddaac2d45ff34b3d361921b870610e7982166d6e1562N.dll
-
Size
3.9MB
-
MD5
911c9b00f2454f2d7c85cfa07e202af0
-
SHA1
2fd4341da864223c8a7e5c85746ccb62ad181889
-
SHA256
389be347fe6a366e3175ddaac2d45ff34b3d361921b870610e7982166d6e1562
-
SHA512
4cc67d10bd79e8adbb23bd7f5f6db4aec474de38fe545596d29a8064832acc65796fb1c03ee744b684437fa60b5fb1d526e601d2a4455db94a631bbcf03d235e
-
SSDEEP
98304:dkx8Y4cYonC/m6Pof4UELtSVFK6pqXLtc+dXeZtF6fJs:dIRzYAC/m6P843xSVFK805ZeZmRs
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1688 rundll32.exe 1688 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1688 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1200 wrote to memory of 1688 1200 rundll32.exe 29 PID 1200 wrote to memory of 1688 1200 rundll32.exe 29 PID 1200 wrote to memory of 1688 1200 rundll32.exe 29 PID 1200 wrote to memory of 1688 1200 rundll32.exe 29 PID 1200 wrote to memory of 1688 1200 rundll32.exe 29 PID 1200 wrote to memory of 1688 1200 rundll32.exe 29 PID 1200 wrote to memory of 1688 1200 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\389be347fe6a366e3175ddaac2d45ff34b3d361921b870610e7982166d6e1562N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\389be347fe6a366e3175ddaac2d45ff34b3d361921b870610e7982166d6e1562N.dll,#12⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1688
-