Overview
overview
10Static
static
3c5d50cd8ce...a9.exe
windows7-x64
10c5d50cd8ce...a9.exe
windows10-2004-x64
8$PLUGINSDI...lo.dll
windows7-x64
3$PLUGINSDI...lo.dll
windows10-2004-x64
3$PLUGINSDI...VT.dll
windows7-x64
3$PLUGINSDI...VT.dll
windows10-2004-x64
3$PLUGINSDI...ZG.dll
windows7-x64
3$PLUGINSDI...ZG.dll
windows10-2004-x64
3Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 03:32
Static task
static1
Behavioral task
behavioral1
Sample
c5d50cd8ce604053ec9ba7ca539def1bd0b90d341cb00f563c45648a8c61b9a9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c5d50cd8ce604053ec9ba7ca539def1bd0b90d341cb00f563c45648a8c61b9a9.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/VLDGHQTvGlo.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/VLDGHQTvGlo.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/wjjAKIqNZVT.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/wjjAKIqNZVT.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/zBwqyhobgZG.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/zBwqyhobgZG.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/wjjAKIqNZVT.dll
-
Size
367KB
-
MD5
25e93633a3533409ec5963b2ef48c81a
-
SHA1
7c3ab6dd14975e3863cfe85e9fc3af2facd68f53
-
SHA256
097f4b3f90d501ef6cf171460dcdceb4382643c6bf1c55a739227f71b1bdc422
-
SHA512
7632564579ad1319344bd8bcc2b3df5acd93c9dd428f10fe61ba2a6b258a2cf57f0de70a3d1bb4fde484792d250385788336a27c4c1ed8e25f87109a65da68bc
-
SSDEEP
6144:WQoCcbX2e63Ns+YMhpiuTktQJbs7bvxFux2R4bq53SPQk:WQoCaXR63phpzTktQJ4Z0x2R4bqQPQk
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2520 2072 rundll32.exe 30 PID 2072 wrote to memory of 2520 2072 rundll32.exe 30 PID 2072 wrote to memory of 2520 2072 rundll32.exe 30 PID 2072 wrote to memory of 2520 2072 rundll32.exe 30 PID 2072 wrote to memory of 2520 2072 rundll32.exe 30 PID 2072 wrote to memory of 2520 2072 rundll32.exe 30 PID 2072 wrote to memory of 2520 2072 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\wjjAKIqNZVT.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\wjjAKIqNZVT.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2520
-