Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 19:52
Behavioral task
behavioral1
Sample
072e4c7e234e8c8f12eb02a2ca648825b5674a7e718cd1fc8e775ecbcafea622.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
072e4c7e234e8c8f12eb02a2ca648825b5674a7e718cd1fc8e775ecbcafea622.dll
Resource
win10v2004-20241007-en
General
-
Target
072e4c7e234e8c8f12eb02a2ca648825b5674a7e718cd1fc8e775ecbcafea622.dll
-
Size
224KB
-
MD5
fc0844bb3060e885ae6ee10f01c89632
-
SHA1
bb86b168cd55c4f1bd143231ca50fda0e91e9440
-
SHA256
072e4c7e234e8c8f12eb02a2ca648825b5674a7e718cd1fc8e775ecbcafea622
-
SHA512
2d4e1f17a4fbfcd24c65042aa058f9af2d92a4e95fa7a5b5676d4e3519946dfeb4c48b1cc44a6da6bfd1134f4999bc8bed7c2d80b50f6a3eceef8169eba1415e
-
SSDEEP
3072:OQ2DvCzSBW6tfsZm2RPKXwXXPmd4w1HCRmkw08oScXLmR0ziq4OYKt9UcV:OftfsZmvHCEkrTLqUC2
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 2 2592 rundll32.exe 4 2592 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2592 2096 rundll32.exe 30 PID 2096 wrote to memory of 2592 2096 rundll32.exe 30 PID 2096 wrote to memory of 2592 2096 rundll32.exe 30 PID 2096 wrote to memory of 2592 2096 rundll32.exe 30 PID 2096 wrote to memory of 2592 2096 rundll32.exe 30 PID 2096 wrote to memory of 2592 2096 rundll32.exe 30 PID 2096 wrote to memory of 2592 2096 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\072e4c7e234e8c8f12eb02a2ca648825b5674a7e718cd1fc8e775ecbcafea622.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\072e4c7e234e8c8f12eb02a2ca648825b5674a7e718cd1fc8e775ecbcafea622.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2592
-