Overview
overview
10Static
static
3c5d50cd8ce...a9.exe
windows7-x64
10c5d50cd8ce...a9.exe
windows10-2004-x64
8$PLUGINSDI...lo.dll
windows7-x64
3$PLUGINSDI...lo.dll
windows10-2004-x64
3$PLUGINSDI...VT.dll
windows7-x64
3$PLUGINSDI...VT.dll
windows10-2004-x64
3$PLUGINSDI...ZG.dll
windows7-x64
3$PLUGINSDI...ZG.dll
windows10-2004-x64
3Analysis
-
max time kernel
94s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 03:32
Static task
static1
Behavioral task
behavioral1
Sample
c5d50cd8ce604053ec9ba7ca539def1bd0b90d341cb00f563c45648a8c61b9a9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c5d50cd8ce604053ec9ba7ca539def1bd0b90d341cb00f563c45648a8c61b9a9.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/VLDGHQTvGlo.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/VLDGHQTvGlo.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/wjjAKIqNZVT.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/wjjAKIqNZVT.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/zBwqyhobgZG.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/zBwqyhobgZG.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/VLDGHQTvGlo.dll
-
Size
558KB
-
MD5
33447f50cfb3c929ed6b0c67713e3081
-
SHA1
aa3f53b1ad107b6cf1ae054ef400dad83cdf2310
-
SHA256
205a0061292c83b409d2b8d42ff09d7f2bc66d6d7df131ccc61d3f785aba368b
-
SHA512
2b60d0115d75becacfe0aacead349eb7cbe4e951041569fb2f676c27f739fea9016837fb2810f6c1e018911e7971fc8b4fbcaae65240510503b7e75db98831c1
-
SSDEEP
12288:sMomWvBp/VZ8qI9uxYmjborJkZlHtAlwSlaUs:kmWvf/VZTXodetDShs
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4744 wrote to memory of 1516 4744 rundll32.exe 83 PID 4744 wrote to memory of 1516 4744 rundll32.exe 83 PID 4744 wrote to memory of 1516 4744 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\VLDGHQTvGlo.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\VLDGHQTvGlo.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1516
-