Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 03:32
Static task
static1
Behavioral task
behavioral1
Sample
63f17d6216918e324cda2a51a383befdc4ec460fd68ff7323ea2fdbbaca5b1dd.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
63f17d6216918e324cda2a51a383befdc4ec460fd68ff7323ea2fdbbaca5b1dd.dll
Resource
win10v2004-20241007-en
General
-
Target
63f17d6216918e324cda2a51a383befdc4ec460fd68ff7323ea2fdbbaca5b1dd.dll
-
Size
6KB
-
MD5
3257e873950f67659ed43c3703fa2d1d
-
SHA1
996a3ece5ca66afb564d6a078f2537ff46ababae
-
SHA256
63f17d6216918e324cda2a51a383befdc4ec460fd68ff7323ea2fdbbaca5b1dd
-
SHA512
6851ee06160e7fba18d0c5e89d37cd34c5a3da8526eb9a2424904b0e75d08cebf029cb616298e0389afb3164580316b990e085682617a2082ad4c341bfdccbf4
-
SSDEEP
96:nEY2RrF1eqwi4e9fasbGmS0ycx/f/zCI9E8Qc+KV:EHRh1epp4asiTw/f/zvvV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2672 2684 rundll32.exe 31 PID 2684 wrote to memory of 2672 2684 rundll32.exe 31 PID 2684 wrote to memory of 2672 2684 rundll32.exe 31 PID 2684 wrote to memory of 2672 2684 rundll32.exe 31 PID 2684 wrote to memory of 2672 2684 rundll32.exe 31 PID 2684 wrote to memory of 2672 2684 rundll32.exe 31 PID 2684 wrote to memory of 2672 2684 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\63f17d6216918e324cda2a51a383befdc4ec460fd68ff7323ea2fdbbaca5b1dd.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\63f17d6216918e324cda2a51a383befdc4ec460fd68ff7323ea2fdbbaca5b1dd.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2672
-