Overview
overview
10Static
static
100355497594...38.dll
windows7-x64
30355497594...38.dll
windows10-2004-x64
32bd44be32a...5f.dll
windows7-x64
32bd44be32a...5f.dll
windows10-2004-x64
358b64582e2...99.dll
windows7-x64
358b64582e2...99.dll
windows10-2004-x64
37dbf54a7d2...c5.dll
windows7-x64
37dbf54a7d2...c5.dll
windows10-2004-x64
3a4d38ea798...d9.dll
windows7-x64
1a4d38ea798...d9.dll
windows10-2004-x64
1b0eb1c41e7...7e.dll
windows7-x64
3b0eb1c41e7...7e.dll
windows10-2004-x64
3dbf8dbd2a9...34.dll
windows7-x64
1dbf8dbd2a9...34.dll
windows10-2004-x64
1e2a33fede9...d3.dll
windows7-x64
3e2a33fede9...d3.dll
windows10-2004-x64
3e894cb2780...7c.dll
windows7-x64
3e894cb2780...7c.dll
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 05:46
Behavioral task
behavioral1
Sample
03554975945fa8367e351f890dd96ae082efa56d9dd4874340409201a86a8e38.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
03554975945fa8367e351f890dd96ae082efa56d9dd4874340409201a86a8e38.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
2bd44be32a10f7fa23f7a277f6f41865c0d67dcb1b4032d22e172a1757b7d15f.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
2bd44be32a10f7fa23f7a277f6f41865c0d67dcb1b4032d22e172a1757b7d15f.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
58b64582e298888676585cb3fe67f3c1f48b74e7ca56ba96b1b63d9baaa0fa99.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
58b64582e298888676585cb3fe67f3c1f48b74e7ca56ba96b1b63d9baaa0fa99.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
7dbf54a7d28bc41c266a9277238b7ca8089e0df97b0c917f3424a443185f99c5.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
7dbf54a7d28bc41c266a9277238b7ca8089e0df97b0c917f3424a443185f99c5.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
a4d38ea798a72ff072d12bf33cc4f478768d0014ab48ecb02a0453a2d10ff6d9.dll
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
a4d38ea798a72ff072d12bf33cc4f478768d0014ab48ecb02a0453a2d10ff6d9.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
b0eb1c41e759592f1d79d30a967323814748ecd8b3fa889dc1138fd512ae987e.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
b0eb1c41e759592f1d79d30a967323814748ecd8b3fa889dc1138fd512ae987e.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
dbf8dbd2a9d41f7f58e02ed7829fc6538cc03403f547b1a6ad8db6428eb0a934.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
dbf8dbd2a9d41f7f58e02ed7829fc6538cc03403f547b1a6ad8db6428eb0a934.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
e2a33fede9a1d897e504541f61bf7ded193e801dda952657d615f34d6b94cdd3.dll
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
e2a33fede9a1d897e504541f61bf7ded193e801dda952657d615f34d6b94cdd3.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
e894cb278095ee0c01d0bd686203f1a23689fadd1f93db41e2867d7e3d65897c.dll
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
e894cb278095ee0c01d0bd686203f1a23689fadd1f93db41e2867d7e3d65897c.dll
Resource
win10v2004-20241007-en
General
-
Target
e894cb278095ee0c01d0bd686203f1a23689fadd1f93db41e2867d7e3d65897c.dll
-
Size
918KB
-
MD5
8e7a91ffe329945b636bcecb2086f90e
-
SHA1
1b97b32f32cada7f720dbcca514598b49a71ac2b
-
SHA256
e894cb278095ee0c01d0bd686203f1a23689fadd1f93db41e2867d7e3d65897c
-
SHA512
c47b6cac73b12b9d77035b52267499b8309b652b1f3c90119f7a63c2d6d4091b49a9ed0adb8cb90a33b3eaf642b201c24a333652297696455234d361833bba5a
-
SSDEEP
24576:SKUpxeQ6bpedoDqED3vyV0fcZa7u6fAiupEJRaOtxiIJaZ:S/pxezpedoDqED6O1vYADxiYaZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1644 wrote to memory of 1648 1644 rundll32.exe 85 PID 1644 wrote to memory of 1648 1644 rundll32.exe 85 PID 1644 wrote to memory of 1648 1644 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e894cb278095ee0c01d0bd686203f1a23689fadd1f93db41e2867d7e3d65897c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e894cb278095ee0c01d0bd686203f1a23689fadd1f93db41e2867d7e3d65897c.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1648
-