Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 07:48
Static task
static1
Behavioral task
behavioral1
Sample
37f6dfcda9d01b7e920de1c7cce417f214b033a9ab88a7fb88381b4290654d83.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
37f6dfcda9d01b7e920de1c7cce417f214b033a9ab88a7fb88381b4290654d83.dll
Resource
win10v2004-20241007-en
General
-
Target
37f6dfcda9d01b7e920de1c7cce417f214b033a9ab88a7fb88381b4290654d83.dll
-
Size
2.0MB
-
MD5
dcb24207266e8a156fdd91d68baac295
-
SHA1
c750ca8c46cdea86714a81dad9d6c3f74cfc738f
-
SHA256
37f6dfcda9d01b7e920de1c7cce417f214b033a9ab88a7fb88381b4290654d83
-
SHA512
44a36d5f74c3d57a80acac6e8775e4ede3cb1dd86e75608fa76bd58ba98385488589ec6f7337f769c1fb80d72e2386864a9bdeb799a1bca26ea869207fb9cf37
-
SSDEEP
49152:NU0NATOxbVgUDi7yqt/OoZ5taD2468HIu9Vdpw7nJdsvel5:q5TabmUDAyqJOA5tn4zHIKVdpw7nR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 3052 wrote to memory of 2100 3052 rundll32.exe rundll32.exe PID 3052 wrote to memory of 2100 3052 rundll32.exe rundll32.exe PID 3052 wrote to memory of 2100 3052 rundll32.exe rundll32.exe PID 3052 wrote to memory of 2100 3052 rundll32.exe rundll32.exe PID 3052 wrote to memory of 2100 3052 rundll32.exe rundll32.exe PID 3052 wrote to memory of 2100 3052 rundll32.exe rundll32.exe PID 3052 wrote to memory of 2100 3052 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\37f6dfcda9d01b7e920de1c7cce417f214b033a9ab88a7fb88381b4290654d83.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\37f6dfcda9d01b7e920de1c7cce417f214b033a9ab88a7fb88381b4290654d83.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2100
-