Overview
overview
10Static
static
100355497594...38.dll
windows7-x64
30355497594...38.dll
windows10-2004-x64
32bd44be32a...5f.dll
windows7-x64
32bd44be32a...5f.dll
windows10-2004-x64
358b64582e2...99.dll
windows7-x64
358b64582e2...99.dll
windows10-2004-x64
37dbf54a7d2...c5.dll
windows7-x64
37dbf54a7d2...c5.dll
windows10-2004-x64
3a4d38ea798...d9.dll
windows7-x64
1a4d38ea798...d9.dll
windows10-2004-x64
1b0eb1c41e7...7e.dll
windows7-x64
3b0eb1c41e7...7e.dll
windows10-2004-x64
3dbf8dbd2a9...34.dll
windows7-x64
1dbf8dbd2a9...34.dll
windows10-2004-x64
1e2a33fede9...d3.dll
windows7-x64
3e2a33fede9...d3.dll
windows10-2004-x64
3e894cb2780...7c.dll
windows7-x64
3e894cb2780...7c.dll
windows10-2004-x64
3Analysis
-
max time kernel
94s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 05:46
Behavioral task
behavioral1
Sample
03554975945fa8367e351f890dd96ae082efa56d9dd4874340409201a86a8e38.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
03554975945fa8367e351f890dd96ae082efa56d9dd4874340409201a86a8e38.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
2bd44be32a10f7fa23f7a277f6f41865c0d67dcb1b4032d22e172a1757b7d15f.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
2bd44be32a10f7fa23f7a277f6f41865c0d67dcb1b4032d22e172a1757b7d15f.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
58b64582e298888676585cb3fe67f3c1f48b74e7ca56ba96b1b63d9baaa0fa99.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
58b64582e298888676585cb3fe67f3c1f48b74e7ca56ba96b1b63d9baaa0fa99.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
7dbf54a7d28bc41c266a9277238b7ca8089e0df97b0c917f3424a443185f99c5.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
7dbf54a7d28bc41c266a9277238b7ca8089e0df97b0c917f3424a443185f99c5.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
a4d38ea798a72ff072d12bf33cc4f478768d0014ab48ecb02a0453a2d10ff6d9.dll
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
a4d38ea798a72ff072d12bf33cc4f478768d0014ab48ecb02a0453a2d10ff6d9.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
b0eb1c41e759592f1d79d30a967323814748ecd8b3fa889dc1138fd512ae987e.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
b0eb1c41e759592f1d79d30a967323814748ecd8b3fa889dc1138fd512ae987e.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
dbf8dbd2a9d41f7f58e02ed7829fc6538cc03403f547b1a6ad8db6428eb0a934.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
dbf8dbd2a9d41f7f58e02ed7829fc6538cc03403f547b1a6ad8db6428eb0a934.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
e2a33fede9a1d897e504541f61bf7ded193e801dda952657d615f34d6b94cdd3.dll
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
e2a33fede9a1d897e504541f61bf7ded193e801dda952657d615f34d6b94cdd3.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
e894cb278095ee0c01d0bd686203f1a23689fadd1f93db41e2867d7e3d65897c.dll
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
e894cb278095ee0c01d0bd686203f1a23689fadd1f93db41e2867d7e3d65897c.dll
Resource
win10v2004-20241007-en
General
-
Target
2bd44be32a10f7fa23f7a277f6f41865c0d67dcb1b4032d22e172a1757b7d15f.dll
-
Size
145KB
-
MD5
0a76642f836c8ee04444ae49d0bc586c
-
SHA1
616d2d1465620ef41c1db75801852b94a7589ae6
-
SHA256
2bd44be32a10f7fa23f7a277f6f41865c0d67dcb1b4032d22e172a1757b7d15f
-
SHA512
94c17f65d660165eef85e4c1d2eec2fc6d1f2f455c121c0ef086b563e77bee9dcb89c99413f1f509fc3c9c555e9cebfc80c1256125295af7213a6ecae9a900fc
-
SSDEEP
3072:TWdclrbslQYoQh5HJfUuYyavjauYELOSnsmbER3qe:Cq8lWQdfUu01b4R3r
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4632 wrote to memory of 3632 4632 rundll32.exe 82 PID 4632 wrote to memory of 3632 4632 rundll32.exe 82 PID 4632 wrote to memory of 3632 4632 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2bd44be32a10f7fa23f7a277f6f41865c0d67dcb1b4032d22e172a1757b7d15f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2bd44be32a10f7fa23f7a277f6f41865c0d67dcb1b4032d22e172a1757b7d15f.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3632
-