Analysis
-
max time kernel
110s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 05:22
Behavioral task
behavioral1
Sample
f7ab4d89651463091483521f78c80036a176f9f87370f14367565958b3dbc8c8.dll
Resource
win7-20241010-en
3 signatures
120 seconds
General
-
Target
f7ab4d89651463091483521f78c80036a176f9f87370f14367565958b3dbc8c8.dll
-
Size
743KB
-
MD5
8275c19b6345a9e68937ebbacbb7d4a3
-
SHA1
2723fbcd2efcb8d6a9c1633f440daa6b23046406
-
SHA256
f7ab4d89651463091483521f78c80036a176f9f87370f14367565958b3dbc8c8
-
SHA512
15f293cda1a4a492e2f7b54433c9c68d8506b32976064e1b25c67a403710c8a6310430410cc2d0742b9ffba87f8ea1fb07e041481982554cc792d6f6583641db
-
SSDEEP
12288:AO8WdfPA9m4oL0YxyVFbLygb74SFaO8zSIbcot1UF1DsF7bMCACvpqkadWy+fcqu:5g9sgYwnK6MSibcS1RNbBvfadmu
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3760-0-0x0000000001ED0000-0x0000000002086000-memory.dmp vmprotect behavioral2/memory/3760-1-0x0000000001ED0000-0x0000000002086000-memory.dmp vmprotect behavioral2/memory/3760-2-0x0000000001ED0000-0x0000000002086000-memory.dmp vmprotect behavioral2/memory/3760-3-0x0000000001ED0000-0x0000000002086000-memory.dmp vmprotect -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 336 wrote to memory of 3760 336 rundll32.exe 83 PID 336 wrote to memory of 3760 336 rundll32.exe 83 PID 336 wrote to memory of 3760 336 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f7ab4d89651463091483521f78c80036a176f9f87370f14367565958b3dbc8c8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f7ab4d89651463091483521f78c80036a176f9f87370f14367565958b3dbc8c8.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3760
-