Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 13:06
Behavioral task
behavioral1
Sample
dc88a5fa27b308345ee9d1dad1f2af1ff5f21f5ed121bfa4cf5dc5f47209ac2a.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc88a5fa27b308345ee9d1dad1f2af1ff5f21f5ed121bfa4cf5dc5f47209ac2a.dll
Resource
win10v2004-20241007-en
General
-
Target
dc88a5fa27b308345ee9d1dad1f2af1ff5f21f5ed121bfa4cf5dc5f47209ac2a.dll
-
Size
504KB
-
MD5
8be1901edad2925f9a7c22434e6fca4f
-
SHA1
b30fe3bf30e0821efd967aa405b04c94c9297144
-
SHA256
dc88a5fa27b308345ee9d1dad1f2af1ff5f21f5ed121bfa4cf5dc5f47209ac2a
-
SHA512
e71f97c95d1808553135c9ec506401e260ae3b32496af3e407598d3398b4a262e1b53d8fffc028bcbb6646c892af9bfc401f76f60abaad608416f5e0445192a8
-
SSDEEP
6144:hJhGdMKjc0MLPuwy8TlK25oLWZmIIiy2TMdGA67AP5nk9pgnjc5:hJhGWxq8NoKmI1IGAFnk90g
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\gzip.dll rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2616 wrote to memory of 1600 2616 rundll32.exe 30 PID 2616 wrote to memory of 1600 2616 rundll32.exe 30 PID 2616 wrote to memory of 1600 2616 rundll32.exe 30 PID 2616 wrote to memory of 1600 2616 rundll32.exe 30 PID 2616 wrote to memory of 1600 2616 rundll32.exe 30 PID 2616 wrote to memory of 1600 2616 rundll32.exe 30 PID 2616 wrote to memory of 1600 2616 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dc88a5fa27b308345ee9d1dad1f2af1ff5f21f5ed121bfa4cf5dc5f47209ac2a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dc88a5fa27b308345ee9d1dad1f2af1ff5f21f5ed121bfa4cf5dc5f47209ac2a.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1600
-