Overview
overview
10Static
static
10massexe.rar
windows10-ltsc 2021-x64
10massexe/Input.txt
windows10-ltsc 2021-x64
1massexe/Ma...UI.exe
windows10-ltsc 2021-x64
10massexe/Packet.dll
windows10-ltsc 2021-x64
3massexe/_config.ini
windows10-ltsc 2021-x64
1massexe/masscan.exe
windows10-ltsc 2021-x64
10massexe/msvcr100.dll
windows10-ltsc 2021-x64
3massexe/wi...13.exe
windows10-ltsc 2021-x64
10massexe/wpcap.dll
windows10-ltsc 2021-x64
3Analysis
-
max time kernel
430s -
max time network
1156s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
06-12-2024 19:44
Behavioral task
behavioral1
Sample
massexe.rar
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
massexe/Input.txt
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
massexe/Massscan_GUI.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
massexe/Packet.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral5
Sample
massexe/_config.ini
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral6
Sample
massexe/masscan.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral7
Sample
massexe/msvcr100.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral8
Sample
massexe/winpcap-4.13.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral9
Sample
massexe/wpcap.dll
Resource
win10ltsc2021-20241023-en
General
-
Target
massexe/Packet.dll
-
Size
94KB
-
MD5
1250bef11bfa086f772cd2a273bc036e
-
SHA1
bfb60b4072f4533d8497f3d90631f818e345bcc6
-
SHA256
6b19cffaa2bf4359be1a0130a1fb47ab45e8c3be5d0cb7986579c5e04e1d77a5
-
SHA512
76cbc346468d400c4e6a95b3c91abfec0a63a375aade6f47c70a3b3db76c513bcfd91ed2994059a6c8bdd6b266f9b17ecf11f9941481c7a2692925d2457f5bba
-
SSDEEP
1536:6wG9plhvRIRVC2wJAyPFCnPKc0z70yIKtIn8zVpWj:E9rjh5t9cZyIKtInb
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3808 wrote to memory of 1556 3808 rundll32.exe 80 PID 3808 wrote to memory of 1556 3808 rundll32.exe 80 PID 3808 wrote to memory of 1556 3808 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\massexe\Packet.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\massexe\Packet.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1556
-