Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 03:19
Behavioral task
behavioral1
Sample
026ef1aaccc2196a5c5704f86eb680cd3417fe84e11f505cc78e751e41d916c2.dll
Resource
win7-20240903-en
windows7-x64
5 signatures
150 seconds
General
-
Target
026ef1aaccc2196a5c5704f86eb680cd3417fe84e11f505cc78e751e41d916c2.dll
-
Size
2.4MB
-
MD5
47f22dd52ff5b4e92219a72628a53b7f
-
SHA1
493a174bdbf8d0f4f50f6ff2a35bee282258a893
-
SHA256
026ef1aaccc2196a5c5704f86eb680cd3417fe84e11f505cc78e751e41d916c2
-
SHA512
80b642e5f1816ebefbf2f5236d9ccbee88be6273238e4fc7470b29d8e5224400ca0fb9c5b70032567f815edd6ceeba484bb47edbf6f31bc095f0f8e29c3249ee
-
SSDEEP
49152:COPYIvNlT+VcFPcEaN/z53wJWqq2NHJPoAlA:zHuE/N
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Dult.dll rundll32.exe -
resource yara_rule behavioral2/memory/4900-0-0x0000000002BC0000-0x0000000002BD9000-memory.dmp upx behavioral2/memory/4900-1-0x0000000002BC0000-0x0000000002BD9000-memory.dmp upx behavioral2/memory/4900-3-0x0000000002BC0000-0x0000000002BD9000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4900 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2616 wrote to memory of 4900 2616 rundll32.exe 82 PID 2616 wrote to memory of 4900 2616 rundll32.exe 82 PID 2616 wrote to memory of 4900 2616 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\026ef1aaccc2196a5c5704f86eb680cd3417fe84e11f505cc78e751e41d916c2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\026ef1aaccc2196a5c5704f86eb680cd3417fe84e11f505cc78e751e41d916c2.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4900
-