Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 03:19
Static task
static1
Behavioral task
behavioral1
Sample
190950642cde880d565b3a60cebc4613a3cb11085643d857ded4935bf828ea0e.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
190950642cde880d565b3a60cebc4613a3cb11085643d857ded4935bf828ea0e.dll
Resource
win10v2004-20241007-en
General
-
Target
190950642cde880d565b3a60cebc4613a3cb11085643d857ded4935bf828ea0e.dll
-
Size
6KB
-
MD5
79a6c271d1f0660cbe9af93598db8493
-
SHA1
de1dac491965a5d2657ad4f5de74524a4cd0cee0
-
SHA256
190950642cde880d565b3a60cebc4613a3cb11085643d857ded4935bf828ea0e
-
SHA512
cc948a713a38713713c78b9936ca929f1d5994a633e55d77f19b29727814da3dd4f54d51b3e9d4cca69778cc35f572dfad0684a8a6747d5c6432d4a5bd884139
-
SSDEEP
96:hy859x0P8MaKA3JLLggEbl/8jR0jAqdOMdND84K4q:F5oLpA3JLkgEJ/8jR6AqYMdJlq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2124 2212 rundll32.exe 30 PID 2212 wrote to memory of 2124 2212 rundll32.exe 30 PID 2212 wrote to memory of 2124 2212 rundll32.exe 30 PID 2212 wrote to memory of 2124 2212 rundll32.exe 30 PID 2212 wrote to memory of 2124 2212 rundll32.exe 30 PID 2212 wrote to memory of 2124 2212 rundll32.exe 30 PID 2212 wrote to memory of 2124 2212 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\190950642cde880d565b3a60cebc4613a3cb11085643d857ded4935bf828ea0e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\190950642cde880d565b3a60cebc4613a3cb11085643d857ded4935bf828ea0e.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2124
-