Analysis
-
max time kernel
74s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 14:44
Behavioral task
behavioral1
Sample
14b067eeeb437720a4001e91af0ec268f04c7cd8dc51998366a21bd523b71afe.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
14b067eeeb437720a4001e91af0ec268f04c7cd8dc51998366a21bd523b71afe.dll
Resource
win10v2004-20241007-en
General
-
Target
14b067eeeb437720a4001e91af0ec268f04c7cd8dc51998366a21bd523b71afe.dll
-
Size
2.2MB
-
MD5
503b52630ac809603218ba7485662625
-
SHA1
623531c5392f44b8dd97c74f72c1c6a211cc0ef3
-
SHA256
14b067eeeb437720a4001e91af0ec268f04c7cd8dc51998366a21bd523b71afe
-
SHA512
2fd203b109052cc03a55b194156caf0244ec6ab6d77db8f6d4a36710470825a3f808919bbeef95e3fba4dc0a328df18fc05303c520887e2188eb47035e6524ab
-
SSDEEP
24576:Cn1B48v68OW5Igcl7mwp/7jHXZo4KI4K7waezYSmI3JJdk60HhQmWqWODdkIkNQe:YE8D8lZ/7b/bDQUO
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1128 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1736 wrote to memory of 1128 1736 rundll32.exe 30 PID 1736 wrote to memory of 1128 1736 rundll32.exe 30 PID 1736 wrote to memory of 1128 1736 rundll32.exe 30 PID 1736 wrote to memory of 1128 1736 rundll32.exe 30 PID 1736 wrote to memory of 1128 1736 rundll32.exe 30 PID 1736 wrote to memory of 1128 1736 rundll32.exe 30 PID 1736 wrote to memory of 1128 1736 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14b067eeeb437720a4001e91af0ec268f04c7cd8dc51998366a21bd523b71afe.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14b067eeeb437720a4001e91af0ec268f04c7cd8dc51998366a21bd523b71afe.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1128
-