Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 14:43
Static task
static1
Behavioral task
behavioral1
Sample
555e6698962d4156f69aa3209dae48139d4458e001cd04e4130a30accc73ff7c.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
555e6698962d4156f69aa3209dae48139d4458e001cd04e4130a30accc73ff7c.dll
Resource
win10v2004-20241007-en
General
-
Target
555e6698962d4156f69aa3209dae48139d4458e001cd04e4130a30accc73ff7c.dll
-
Size
2.9MB
-
MD5
d715b622545bafb775809ffab8014839
-
SHA1
912e9275d186b74b45db696025b6832cd87224cf
-
SHA256
555e6698962d4156f69aa3209dae48139d4458e001cd04e4130a30accc73ff7c
-
SHA512
8d2e466ef9982f70b50360a9a10b52ce06c0242d1f7836892aedb13b30283aec38b0c2336b02420152faeb88f8f996e53ce0a96b50b2f0e829863a8e85c18a56
-
SSDEEP
49152:Xan7Ni8SUGNQtlnynKMlqU9up8wgBjaw/8ftNx5KMYs18X5rEklt8XIba5k:Xa7Ni8SUblnynKkF9uvgVawYNxdh1mVX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2972 wrote to memory of 3048 2972 rundll32.exe 30 PID 2972 wrote to memory of 3048 2972 rundll32.exe 30 PID 2972 wrote to memory of 3048 2972 rundll32.exe 30 PID 2972 wrote to memory of 3048 2972 rundll32.exe 30 PID 2972 wrote to memory of 3048 2972 rundll32.exe 30 PID 2972 wrote to memory of 3048 2972 rundll32.exe 30 PID 2972 wrote to memory of 3048 2972 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\555e6698962d4156f69aa3209dae48139d4458e001cd04e4130a30accc73ff7c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\555e6698962d4156f69aa3209dae48139d4458e001cd04e4130a30accc73ff7c.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3048
-