Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 23:17
Static task
static1
Behavioral task
behavioral1
Sample
2bb1066b38de737899e64cda171b4129311489ef1cf184246be198af04e9cc7e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2bb1066b38de737899e64cda171b4129311489ef1cf184246be198af04e9cc7e.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ilrl.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ilrl.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/ilrl.dll
-
Size
39KB
-
MD5
76edb1ef7191b88b1f7aef00578fa233
-
SHA1
ac139239a33a9c5010498682842598b3db8cfe47
-
SHA256
d443dbd070c2c9bfc89727fbba164ead77f562cf29f959762342807ca4f42704
-
SHA512
111ad9c3b7ba63ba9a44e3bd73049469d6fd6f159a2dc7447b1e7ac0ae342fe091e235582a9990213e703323a7afeb96fc1d756576da5dbae8d1ad96641e769d
-
SSDEEP
384:PN2NM1++IVFCNnhqFartR1836QlVq4kn6RRCj+7+5YkyXLQY2eCxsd0MSJ:Vb2VFCNAFaJ7arlVhkl5YpSeCi0v
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid Process procid_target PID 2520 wrote to memory of 2784 2520 rundll32.exe 84 PID 2520 wrote to memory of 2784 2520 rundll32.exe 84 PID 2520 wrote to memory of 2784 2520 rundll32.exe 84 PID 2784 wrote to memory of 2484 2784 rundll32.exe 85 PID 2784 wrote to memory of 2484 2784 rundll32.exe 85 PID 2784 wrote to memory of 2484 2784 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\ilrl.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\ilrl.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\ilrl.dll,#13⤵PID:2484
-
-