Analysis
-
max time kernel
94s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:18
Static task
static1
Behavioral task
behavioral1
Sample
e881ca5d0fedf03389648c542b240467572cb0c1ffae147d30c0e2d521f53862.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
e881ca5d0fedf03389648c542b240467572cb0c1ffae147d30c0e2d521f53862.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nbjkg.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nbjkg.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/nbjkg.dll
-
Size
38KB
-
MD5
ff488c7d8f8f03c34e67a7ac3ebeaafe
-
SHA1
bbc4aacac09047d12f6ea5b54a24255e9389ba0e
-
SHA256
b6f7a133237e590893ca7e6aceb76d96c8bfff8c767dcd4db53a57b366366dfa
-
SHA512
9955013d4f601507ab35453a5b38063cadd2f75946ed998169d7fc42fe133deed31a0927693c8f131161df5281e0a2499b2b37359f7662b3e948c2cf407e11f1
-
SSDEEP
768:iNQs0OCYx0PV+EtiuxNs7sTHrHAm/N49v2PtyCjQphC/5BlfB4We8wCX04e7Z8Ym:5hOCggNsudB4We8w54e7Zhb6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4840 wrote to memory of 1296 4840 rundll32.exe 83 PID 4840 wrote to memory of 1296 4840 rundll32.exe 83 PID 4840 wrote to memory of 1296 4840 rundll32.exe 83 PID 1296 wrote to memory of 1872 1296 rundll32.exe 84 PID 1296 wrote to memory of 1872 1296 rundll32.exe 84 PID 1296 wrote to memory of 1872 1296 rundll32.exe 84 PID 1296 wrote to memory of 1872 1296 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nbjkg.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nbjkg.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nbjkg.dll,#13⤵PID:1872
-
-