Analysis
-
max time kernel
94s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 12:52
Behavioral task
behavioral1
Sample
socks.dll
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
socks.dll
Resource
win10v2004-20241007-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
socks.dll
-
Size
11KB
-
MD5
ba11a2315fe2fab73a93f8109c50b423
-
SHA1
26cbaf95db474393e81c8189416a7013ced8a046
-
SHA256
2f5e78a842f0e4b9a4851177188d97fe43777962c73eb50c03dc4a9e74b3be60
-
SHA512
2e951e962f502f7a07b045ba1e5bea20baca33e87dc83195983843e8c0b223cadc850a74a4d24b0b047f7e144e8f84c79cac883a2634c26ddbf1d8b88794123e
-
SSDEEP
192:lNCTnyn4lpuIc7rcWQcp7CkXhrQzpa1u:G7DpuIiHdXua1
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 5 4688 rundll32.exe 6 4688 rundll32.exe 9 4688 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4992 wrote to memory of 4688 4992 rundll32.exe 85 PID 4992 wrote to memory of 4688 4992 rundll32.exe 85 PID 4992 wrote to memory of 4688 4992 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\socks.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\socks.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:4688
-