Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 15:46
Behavioral task
behavioral1
Sample
897657eacd7dcc4f7269af97d227f3303350a39547deaf5872e4f9528e76d35b.dll
Resource
win7-20240729-en
5 signatures
150 seconds
General
-
Target
897657eacd7dcc4f7269af97d227f3303350a39547deaf5872e4f9528e76d35b.dll
-
Size
38KB
-
MD5
3590bafab02d30113c1bd8dbad288e6c
-
SHA1
2946abcbbf2ed9296e5448d11cb8d5465a12e8dd
-
SHA256
897657eacd7dcc4f7269af97d227f3303350a39547deaf5872e4f9528e76d35b
-
SHA512
378c839d9190fbcb7869038a8077a28505665c9a6ef4143bc155f76d1e52bd39fab155eebb356c3d4775e84b0d3f3f5720bc841b50d786b5302b62e493967f7e
-
SSDEEP
768:Bs+/gMsLIn/wIj2labk+1IsceGSnkmJ0Yblr583CJrVV7CsXUSYj6m2sBVVn:WD8w22laSR0V+3CJrVdXYzJJ
Malware Config
Signatures
-
Ramnit family
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\dmlconf.dat rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1856 wrote to memory of 2508 1856 rundll32.exe 30 PID 1856 wrote to memory of 2508 1856 rundll32.exe 30 PID 1856 wrote to memory of 2508 1856 rundll32.exe 30 PID 1856 wrote to memory of 2508 1856 rundll32.exe 30 PID 1856 wrote to memory of 2508 1856 rundll32.exe 30 PID 1856 wrote to memory of 2508 1856 rundll32.exe 30 PID 1856 wrote to memory of 2508 1856 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\897657eacd7dcc4f7269af97d227f3303350a39547deaf5872e4f9528e76d35b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\897657eacd7dcc4f7269af97d227f3303350a39547deaf5872e4f9528e76d35b.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2508
-