Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 14:24
Behavioral task
behavioral1
Sample
f494568f3453ab4bf03fdf16dce23393c41914c26e0f8ecf0dc9611580b44fd3N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f494568f3453ab4bf03fdf16dce23393c41914c26e0f8ecf0dc9611580b44fd3N.dll
Resource
win10v2004-20241007-en
General
-
Target
f494568f3453ab4bf03fdf16dce23393c41914c26e0f8ecf0dc9611580b44fd3N.dll
-
Size
327KB
-
MD5
a054754bd0c567a60ed440c585b53ea0
-
SHA1
cefad7aff2ce8dd0bfa024695291a72544f10738
-
SHA256
f494568f3453ab4bf03fdf16dce23393c41914c26e0f8ecf0dc9611580b44fd3
-
SHA512
01197b1087edd512e64528b7cf78dde4d4345d20a75b4a73081a2fdc7eddfc9075decee99a1b79d95f2ea1b72dddb3585f419cf094f94e11d59a0aa410f47faa
-
SSDEEP
6144:EmWPDNND9yRPzLq+YXFqaZiMLic9kzVd7EAC48Ss9Ei:EmWhND9yJz+b1FcMLmp2AT8Ssd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2064 2672 rundll32.exe 30 PID 2672 wrote to memory of 2064 2672 rundll32.exe 30 PID 2672 wrote to memory of 2064 2672 rundll32.exe 30 PID 2672 wrote to memory of 2064 2672 rundll32.exe 30 PID 2672 wrote to memory of 2064 2672 rundll32.exe 30 PID 2672 wrote to memory of 2064 2672 rundll32.exe 30 PID 2672 wrote to memory of 2064 2672 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f494568f3453ab4bf03fdf16dce23393c41914c26e0f8ecf0dc9611580b44fd3N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f494568f3453ab4bf03fdf16dce23393c41914c26e0f8ecf0dc9611580b44fd3N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2064
-