Analysis
-
max time kernel
91s -
max time network
97s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
26-11-2024 03:24
General
-
Target
7d7ae695a105204b7c073614395c39ea66729252b50e754848ec8fdbd7d72d5c.dll
-
Size
112KB
-
MD5
65f0477e315b8e86c73bdd35d6349f80
-
SHA1
b8657ee1defd7377ca1e56c99e5f536d7f9fdb75
-
SHA256
7d7ae695a105204b7c073614395c39ea66729252b50e754848ec8fdbd7d72d5c
-
SHA512
a307118f7e6e5384631878c21c064e47446191e7d0359d1e2f045972f079861faaab2ac7c3e55f7886bf47f3a5799bd3d18f6a75a3f6a4ebdb47bd0368032b19
-
SSDEEP
768:wGulj5gCiyVQFPVNCOQq7IVa9tyuljah:wqCnWFVpIs9c
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/4984-0-0x0000000010000000-0x000000001001C000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2664 wrote to memory of 4984 2664 rundll32.exe 79 PID 2664 wrote to memory of 4984 2664 rundll32.exe 79 PID 2664 wrote to memory of 4984 2664 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7d7ae695a105204b7c073614395c39ea66729252b50e754848ec8fdbd7d72d5c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7d7ae695a105204b7c073614395c39ea66729252b50e754848ec8fdbd7d72d5c.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4984
-