Overview
overview
10Static
static
3c5d50cd8ce...a9.exe
windows7-x64
10c5d50cd8ce...a9.exe
windows10-2004-x64
8$PLUGINSDI...lo.dll
windows7-x64
3$PLUGINSDI...lo.dll
windows10-2004-x64
3$PLUGINSDI...VT.dll
windows7-x64
3$PLUGINSDI...VT.dll
windows10-2004-x64
3$PLUGINSDI...ZG.dll
windows7-x64
3$PLUGINSDI...ZG.dll
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 03:32
Static task
static1
Behavioral task
behavioral1
Sample
c5d50cd8ce604053ec9ba7ca539def1bd0b90d341cb00f563c45648a8c61b9a9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c5d50cd8ce604053ec9ba7ca539def1bd0b90d341cb00f563c45648a8c61b9a9.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/VLDGHQTvGlo.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/VLDGHQTvGlo.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/wjjAKIqNZVT.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/wjjAKIqNZVT.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/zBwqyhobgZG.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/zBwqyhobgZG.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/zBwqyhobgZG.dll
-
Size
116KB
-
MD5
a357dff2b22e52f979ae6b777913a8a3
-
SHA1
bba7622c681653e043381c42a49b1ee9df1eeff1
-
SHA256
ef8b736acd1e8ca1195d15334b42fddd1e6e88df66ab471f86c0a99f6c5ac4ac
-
SHA512
b6e6f91ee62903f3a6c4a53aa8e216e1a3eb3f4908eef9c76d29e4219a9b25e6ce092e58e39603cb90138327d0f7d60fad68510f5aedc0ac51ba89f8ead1a12f
-
SSDEEP
1536:h+T7r6xdLwJWc+4orPHT/xEv5PElHGkNMkL/9rgrBa/aN:hKrcxVTqhqvMg/9rgrBa/a
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1488 wrote to memory of 3840 1488 rundll32.exe 83 PID 1488 wrote to memory of 3840 1488 rundll32.exe 83 PID 1488 wrote to memory of 3840 1488 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\zBwqyhobgZG.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\zBwqyhobgZG.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3840
-