Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 23:35
Behavioral task
behavioral1
Sample
833898245998022c4554ab1917e2417d3d8d6768d73dedd8eb1dc1099d9d4100.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
833898245998022c4554ab1917e2417d3d8d6768d73dedd8eb1dc1099d9d4100.dll
Resource
win10v2004-20241007-en
General
-
Target
833898245998022c4554ab1917e2417d3d8d6768d73dedd8eb1dc1099d9d4100.dll
-
Size
144KB
-
MD5
87db2ffe29ececfdf03e53d22d609a84
-
SHA1
d03a33e5604494cc065eab6a7eea9828ac64eae3
-
SHA256
833898245998022c4554ab1917e2417d3d8d6768d73dedd8eb1dc1099d9d4100
-
SHA512
affcea65160fa159740ba578fe9cf41e6d341c0832fe6dac45b80173755fd0c422b70a871f65f45ace108d5b257ba7eafcc6c9fa2a94c513d0c1c9daa17d67db
-
SSDEEP
3072:0yZMB1xAJ65RkkdN2/aImKGDGTZz77ty:0yZSXyUt2SIm1G0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid Process procid_target PID 1404 wrote to memory of 2512 1404 rundll32.exe 31 PID 1404 wrote to memory of 2512 1404 rundll32.exe 31 PID 1404 wrote to memory of 2512 1404 rundll32.exe 31 PID 1404 wrote to memory of 2512 1404 rundll32.exe 31 PID 1404 wrote to memory of 2512 1404 rundll32.exe 31 PID 1404 wrote to memory of 2512 1404 rundll32.exe 31 PID 1404 wrote to memory of 2512 1404 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\833898245998022c4554ab1917e2417d3d8d6768d73dedd8eb1dc1099d9d4100.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\833898245998022c4554ab1917e2417d3d8d6768d73dedd8eb1dc1099d9d4100.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2512
-