Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
19-11-2024 13:04
Behavioral task
behavioral1
Sample
2888-4-0x00000000023E0000-0x00000000025D4000-memory.dll
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2888-4-0x00000000023E0000-0x00000000025D4000-memory.dll
Resource
win10v2004-20241007-en
General
-
Target
2888-4-0x00000000023E0000-0x00000000025D4000-memory.dll
-
Size
2.0MB
-
MD5
b7d650e9be45aaf75bfad57c6338a717
-
SHA1
1b665ee009d18f58f73a256707475b132179828a
-
SHA256
043524986a526dfa3f077605d42284395caf214434fb49c20c7520683932c15e
-
SHA512
1fa3ae3ee3ed052359912f24ad369cec95ad1fd102de27e830b8bf28ef0baa7d09e0f4458cf9925d4154d50b5c2ae22400663de9e8d43b5bfabde830061732cb
-
SSDEEP
49152:OWPKYJVH/aMXKRDD9HkzTnPxQ6kcpTz/+aaaqfn8+nFFQCxEsJwKQC:OGKYJVH/aMXKRDD9HkzTPxQ6Eaaaqf8x
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid Process procid_target PID 1700 wrote to memory of 1900 1700 rundll32.exe 30 PID 1700 wrote to memory of 1900 1700 rundll32.exe 30 PID 1700 wrote to memory of 1900 1700 rundll32.exe 30 PID 1700 wrote to memory of 1900 1700 rundll32.exe 30 PID 1700 wrote to memory of 1900 1700 rundll32.exe 30 PID 1700 wrote to memory of 1900 1700 rundll32.exe 30 PID 1700 wrote to memory of 1900 1700 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2888-4-0x00000000023E0000-0x00000000025D4000-memory.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2888-4-0x00000000023E0000-0x00000000025D4000-memory.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1900
-