Analysis
-
max time kernel
74s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 14:00
Static task
static1
Behavioral task
behavioral1
Sample
009a1e1a6e7d68d11252538033e73cc5ad0fa4187507d510606cc2151ef77bdd.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
009a1e1a6e7d68d11252538033e73cc5ad0fa4187507d510606cc2151ef77bdd.dll
Resource
win10v2004-20241007-en
General
-
Target
009a1e1a6e7d68d11252538033e73cc5ad0fa4187507d510606cc2151ef77bdd.dll
-
Size
284KB
-
MD5
254e25d9c245c1c31195abf07c33ace8
-
SHA1
abb2f7c53bdba666327ca57e84858b0f2d06b32f
-
SHA256
009a1e1a6e7d68d11252538033e73cc5ad0fa4187507d510606cc2151ef77bdd
-
SHA512
2505dff96fb1ef123d865e027a163be1535d918d07145c0f27b8881c235ebf66d3d40bd8f7d10eaa9288aa8a70eb70238ee34cdd514c4f6bd87a84d7b177c909
-
SSDEEP
3072:PyMOh3r78V+l1zYJ6c5ya6by1VwEgvI1S9eWHfkq6VEf2h0xqE:PKr78fsGyhv6iDSVEf28/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2832 2820 rundll32.exe 30 PID 2820 wrote to memory of 2832 2820 rundll32.exe 30 PID 2820 wrote to memory of 2832 2820 rundll32.exe 30 PID 2820 wrote to memory of 2832 2820 rundll32.exe 30 PID 2820 wrote to memory of 2832 2820 rundll32.exe 30 PID 2820 wrote to memory of 2832 2820 rundll32.exe 30 PID 2820 wrote to memory of 2832 2820 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\009a1e1a6e7d68d11252538033e73cc5ad0fa4187507d510606cc2151ef77bdd.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\009a1e1a6e7d68d11252538033e73cc5ad0fa4187507d510606cc2151ef77bdd.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2832
-