Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 18:14
Static task
static1
Behavioral task
behavioral1
Sample
2e3c4ae273ac67e1e9a84ff39afca01489369ceae65ca815299089030077f60e.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2e3c4ae273ac67e1e9a84ff39afca01489369ceae65ca815299089030077f60e.dll
Resource
win10v2004-20241007-en
General
-
Target
2e3c4ae273ac67e1e9a84ff39afca01489369ceae65ca815299089030077f60e.dll
-
Size
3.7MB
-
MD5
560068251a6fff3a9ea00b2cc0ad73d7
-
SHA1
7e03776790a42d8aa7f98bcdd9dd507157c65bc1
-
SHA256
2e3c4ae273ac67e1e9a84ff39afca01489369ceae65ca815299089030077f60e
-
SHA512
850402091a57ee4c8869251c6a4758ab11ebf9d768d44606f116beed2cc1b89e79c41113d6fc2b905ddce37d0661c3b1e186dc05ac54f778c985ab3d41a399f5
-
SSDEEP
49152:9KzuqND5TFD0/fHS6mokadNqtz7YfNI8LvXGOPzn:8zuqNFTC/fy6mCdNqtz7oNI8LvXGOPz
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2484 2340 rundll32.exe 31 PID 2340 wrote to memory of 2484 2340 rundll32.exe 31 PID 2340 wrote to memory of 2484 2340 rundll32.exe 31 PID 2340 wrote to memory of 2484 2340 rundll32.exe 31 PID 2340 wrote to memory of 2484 2340 rundll32.exe 31 PID 2340 wrote to memory of 2484 2340 rundll32.exe 31 PID 2340 wrote to memory of 2484 2340 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2e3c4ae273ac67e1e9a84ff39afca01489369ceae65ca815299089030077f60e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2e3c4ae273ac67e1e9a84ff39afca01489369ceae65ca815299089030077f60e.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2484
-