Analysis
-
max time kernel
118s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 23:22
Behavioral task
behavioral1
Sample
0bd615220bbce3c010cfeae9d5dc62f28a7fdda82d888d6281fca25006f7c2f4.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0bd615220bbce3c010cfeae9d5dc62f28a7fdda82d888d6281fca25006f7c2f4.dll
Resource
win10v2004-20241007-en
General
-
Target
0bd615220bbce3c010cfeae9d5dc62f28a7fdda82d888d6281fca25006f7c2f4.dll
-
Size
156KB
-
MD5
d62d2e2ef54b5a20ee5d5d3483a8fed0
-
SHA1
5067b13c6ae4c2f49442af26955b44006e58c372
-
SHA256
0bd615220bbce3c010cfeae9d5dc62f28a7fdda82d888d6281fca25006f7c2f4
-
SHA512
c4336c9274417b3c7ad3a4d7281f41306647882747ce8012b4cbd6893ead53652504ec41fac92d858baf00c22691d7f2fa311315d6c44003f44b0f510fa962d3
-
SSDEEP
3072:6tVSb280MxfZrQwyoBgM2oJchcJbfRQ7vj4dLK:6tVO2ZAfGEgM2ouSJbW7kdL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid Process procid_target PID 1320 wrote to memory of 1420 1320 rundll32.exe 30 PID 1320 wrote to memory of 1420 1320 rundll32.exe 30 PID 1320 wrote to memory of 1420 1320 rundll32.exe 30 PID 1320 wrote to memory of 1420 1320 rundll32.exe 30 PID 1320 wrote to memory of 1420 1320 rundll32.exe 30 PID 1320 wrote to memory of 1420 1320 rundll32.exe 30 PID 1320 wrote to memory of 1420 1320 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0bd615220bbce3c010cfeae9d5dc62f28a7fdda82d888d6281fca25006f7c2f4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0bd615220bbce3c010cfeae9d5dc62f28a7fdda82d888d6281fca25006f7c2f4.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1420
-