Analysis
-
max time kernel
141s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 21:24
Behavioral task
behavioral1
Sample
3baa10fdeff795a844c811d34686e50a40e2e6d8f794ab5fdaabcce3101ac26c.dll
Resource
win7-20240729-en
General
-
Target
3baa10fdeff795a844c811d34686e50a40e2e6d8f794ab5fdaabcce3101ac26c.dll
-
Size
76KB
-
MD5
3310eafb5db548469cdc7047b7cd4c3b
-
SHA1
ca6b8d5e54e985056c9a68c7c06cabcf1df7f750
-
SHA256
3baa10fdeff795a844c811d34686e50a40e2e6d8f794ab5fdaabcce3101ac26c
-
SHA512
99865eea9293b961bf770e225a20c82c5a055ed6dbfd68ae40c08c155599734ed5dfba3223e57a1e5fb7c98e31f0a6b0afa15267a7c244a78d49054e0df55249
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZTk:c8y93KQjy7G55riF1cMo03C
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
resource yara_rule behavioral1/memory/2344-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2344-1-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2344-2-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2344-3-0x0000000010000000-0x0000000010030000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2344 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2344 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1440 wrote to memory of 2344 1440 rundll32.exe 30 PID 1440 wrote to memory of 2344 1440 rundll32.exe 30 PID 1440 wrote to memory of 2344 1440 rundll32.exe 30 PID 1440 wrote to memory of 2344 1440 rundll32.exe 30 PID 1440 wrote to memory of 2344 1440 rundll32.exe 30 PID 1440 wrote to memory of 2344 1440 rundll32.exe 30 PID 1440 wrote to memory of 2344 1440 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3baa10fdeff795a844c811d34686e50a40e2e6d8f794ab5fdaabcce3101ac26c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3baa10fdeff795a844c811d34686e50a40e2e6d8f794ab5fdaabcce3101ac26c.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2344
-