Analysis
-
max time kernel
415s -
max time network
431s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 03:06
Static task
static1
Behavioral task
behavioral1
Sample
XLN_KeyGen.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
$TEMP/BASSMOD.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$TEMP/R2RXLNKG.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
$TEMP/keygen.exe
Resource
win10v2004-20241007-en
General
-
Target
$TEMP/R2RXLNKG.dll
-
Size
6KB
-
MD5
edc9d719c3bdb5702e28abf9df8359b6
-
SHA1
d433026c1a8c51552d1ad657a8fccf81cc73ac76
-
SHA256
76d9ffeeb89773c56d58fd8935c2d310aacdae3b590f3cc7aa24ed267339a735
-
SHA512
a7f866c2bce0e73d893bc07d5a298f5905ea3cddd11e111e5c1195959a9e5f2a0607670b6506860cadd1fa88eef05bf23063128c0d806184ec35d9daa0327197
-
SSDEEP
96:MuPsNE+ByIO4EOkkIrZjr1LTReB55H7bl01tzDAQ2bJJ:M39BLEOqjr9TGD2TDAQ2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2316 2340 rundll32.exe 83 PID 2340 wrote to memory of 2316 2340 rundll32.exe 83 PID 2340 wrote to memory of 2316 2340 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$TEMP\R2RXLNKG.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$TEMP\R2RXLNKG.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2316
-