Overview
overview
10Static
static
100468127a19...1f.exe
windows11-21h2-x64
32a3b92f618...6b.exe
windows11-21h2-x64
10b154ac015c...cf.exe
windows11-21h2-x64
8b96bd6bbf0...69.exe
windows11-21h2-x64
10bb8e52face...3e.dll
windows11-21h2-x64
8ca467e3323...a4.dll
windows11-21h2-x64
8e93d6f4ce3...ad.exe
windows11-21h2-x64
10fa5390bbcc...f6.exe
windows11-21h2-x64
10Analysis
-
max time kernel
80s -
max time network
6s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
10-12-2024 13:45
Behavioral task
behavioral1
Sample
0468127a19daf4c7bc41015c5640fe1f.exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
2a3b92f6180367306d750e59c9b6446b.exe
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
b154ac015c0d1d6250032f63c749f9cf.exe
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
b96bd6bbf0e3f4f98b606a2ab5db4a69.exe
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
bb8e52face5b076cc890bbfaaf4bb73e.dll
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
ca467e332368cbae652245faa4978aa4.dll
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
e93d6f4ce34d4f594d7aed76cfde0fad.exe
Resource
win11-20241007-en
General
-
Target
bb8e52face5b076cc890bbfaaf4bb73e.dll
-
Size
222KB
-
MD5
bb8e52face5b076cc890bbfaaf4bb73e
-
SHA1
df430358a2c7eaf3e328a00a6f961ded9428e491
-
SHA256
5545f31c832c8bde6cf7563cdc0f4a4b9b15416480e14f15420b1691444c376d
-
SHA512
f465c12bf336e659608c3a4f1e8e14b0876d28f0ad1a75ffb60c674da9a3535493a7e9357ef6b55f78666418ef9c4f7795aa2840aac0f41d6b53131e353b1a59
-
SSDEEP
6144:qJ+WK/pvT7arfwKFzDTsv5oaTh45CjBscX9TEGgO:RJpb7Y7vf5i5X9TcO
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 2 896 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4804 wrote to memory of 896 4804 rundll32.exe 77 PID 4804 wrote to memory of 896 4804 rundll32.exe 77 PID 4804 wrote to memory of 896 4804 rundll32.exe 77
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb8e52face5b076cc890bbfaaf4bb73e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb8e52face5b076cc890bbfaaf4bb73e.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:896
-