Analysis
-
max time kernel
92s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 20:25
Static task
static1
Behavioral task
behavioral1
Sample
AvastSvcpCP/AvastSvc.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
AvastSvcpCP/AvastSvc.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
AvastSvcpCP/wsc.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
AvastSvcpCP/wsc.dll
Resource
win10v2004-20241007-en
General
-
Target
AvastSvcpCP/wsc.dll
-
Size
80KB
-
MD5
722b15bbc15845e4e265a1519c800c34
-
SHA1
56bac516227d9fddc08ca586dba5c9085d203f99
-
SHA256
e8f55d0f327fd1d5f26428b890ef7fe878e135d494acda24ef01c695a2e9136d
-
SHA512
a925614f3e89e37198d875670b3844449d6ab77728d53c1a06a5db035b7117a0b61cd8ada0022b6b5e0e8d6fad9417561a82cdbb5b288273c60b1469816a9d0d
-
SSDEEP
1536:HEI2BTzyutxs8TLWyEL59s6TaIret4R27t2Wfu63y:H+WTLHI4RQt2Wfri
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3456 wrote to memory of 404 3456 rundll32.exe 82 PID 3456 wrote to memory of 404 3456 rundll32.exe 82 PID 3456 wrote to memory of 404 3456 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\AvastSvcpCP\wsc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\AvastSvcpCP\wsc.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:404
-