Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 03:19
Behavioral task
behavioral1
Sample
026ef1aaccc2196a5c5704f86eb680cd3417fe84e11f505cc78e751e41d916c2.dll
Resource
win7-20240903-en
windows7-x64
5 signatures
150 seconds
General
-
Target
026ef1aaccc2196a5c5704f86eb680cd3417fe84e11f505cc78e751e41d916c2.dll
-
Size
2.4MB
-
MD5
47f22dd52ff5b4e92219a72628a53b7f
-
SHA1
493a174bdbf8d0f4f50f6ff2a35bee282258a893
-
SHA256
026ef1aaccc2196a5c5704f86eb680cd3417fe84e11f505cc78e751e41d916c2
-
SHA512
80b642e5f1816ebefbf2f5236d9ccbee88be6273238e4fc7470b29d8e5224400ca0fb9c5b70032567f815edd6ceeba484bb47edbf6f31bc095f0f8e29c3249ee
-
SSDEEP
49152:COPYIvNlT+VcFPcEaN/z53wJWqq2NHJPoAlA:zHuE/N
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Dult.dll rundll32.exe -
resource yara_rule behavioral1/memory/2104-1-0x0000000000210000-0x0000000000229000-memory.dmp upx behavioral1/memory/2104-0-0x0000000000210000-0x0000000000229000-memory.dmp upx behavioral1/memory/2104-3-0x0000000000210000-0x0000000000229000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2104 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2104 2124 rundll32.exe 30 PID 2124 wrote to memory of 2104 2124 rundll32.exe 30 PID 2124 wrote to memory of 2104 2124 rundll32.exe 30 PID 2124 wrote to memory of 2104 2124 rundll32.exe 30 PID 2124 wrote to memory of 2104 2124 rundll32.exe 30 PID 2124 wrote to memory of 2104 2124 rundll32.exe 30 PID 2124 wrote to memory of 2104 2124 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\026ef1aaccc2196a5c5704f86eb680cd3417fe84e11f505cc78e751e41d916c2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\026ef1aaccc2196a5c5704f86eb680cd3417fe84e11f505cc78e751e41d916c2.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2104
-