Analysis
-
max time kernel
94s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 10:41
Behavioral task
behavioral1
Sample
3dc27b5f607a81c065e86bcfa27e35cc48c585fdb62f24bc6a9141460a14698b.dll
Resource
win7-20240903-en
windows7-x64
18 signatures
150 seconds
General
-
Target
3dc27b5f607a81c065e86bcfa27e35cc48c585fdb62f24bc6a9141460a14698b.dll
-
Size
430KB
-
MD5
baeb8abfaa635845ad9934b96f083ca4
-
SHA1
d3fe86e4805d1d68e97d60106862ae3623dc0415
-
SHA256
3dc27b5f607a81c065e86bcfa27e35cc48c585fdb62f24bc6a9141460a14698b
-
SHA512
f344f277a9324494ad8b80c8c90885fee8626aa06b0dcfb0401a39893faee99cfb917fd607dc4ca2acc93147323773f0869f5cabf56bc0d89c49822674779ac5
-
SSDEEP
12288:q9j8pWxJdNxnSJwu416c9y0wiL7s1T37AVu68VnogfN7oSI:q9I+dGwu13UVb+n3fNG
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2460-0-0x0000000010000000-0x00000000100FE000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2460 2852 rundll32.exe 82 PID 2852 wrote to memory of 2460 2852 rundll32.exe 82 PID 2852 wrote to memory of 2460 2852 rundll32.exe 82 PID 2460 wrote to memory of 3396 2460 rundll32.exe 83 PID 2460 wrote to memory of 3396 2460 rundll32.exe 83 PID 2460 wrote to memory of 3396 2460 rundll32.exe 83 PID 2460 wrote to memory of 2240 2460 rundll32.exe 84 PID 2460 wrote to memory of 2240 2460 rundll32.exe 84 PID 2460 wrote to memory of 2240 2460 rundll32.exe 84 PID 2460 wrote to memory of 3952 2460 rundll32.exe 85 PID 2460 wrote to memory of 3952 2460 rundll32.exe 85 PID 2460 wrote to memory of 3952 2460 rundll32.exe 85 PID 2460 wrote to memory of 4488 2460 rundll32.exe 86 PID 2460 wrote to memory of 4488 2460 rundll32.exe 86 PID 2460 wrote to memory of 4488 2460 rundll32.exe 86 PID 2460 wrote to memory of 1584 2460 rundll32.exe 87 PID 2460 wrote to memory of 1584 2460 rundll32.exe 87 PID 2460 wrote to memory of 1584 2460 rundll32.exe 87 PID 2460 wrote to memory of 4104 2460 rundll32.exe 88 PID 2460 wrote to memory of 4104 2460 rundll32.exe 88 PID 2460 wrote to memory of 4104 2460 rundll32.exe 88 PID 2460 wrote to memory of 5080 2460 rundll32.exe 89 PID 2460 wrote to memory of 5080 2460 rundll32.exe 89 PID 2460 wrote to memory of 5080 2460 rundll32.exe 89 PID 2460 wrote to memory of 8 2460 rundll32.exe 90 PID 2460 wrote to memory of 8 2460 rundll32.exe 90 PID 2460 wrote to memory of 8 2460 rundll32.exe 90 PID 2460 wrote to memory of 1560 2460 rundll32.exe 91 PID 2460 wrote to memory of 1560 2460 rundll32.exe 91 PID 2460 wrote to memory of 1560 2460 rundll32.exe 91 PID 2460 wrote to memory of 1548 2460 rundll32.exe 92 PID 2460 wrote to memory of 1548 2460 rundll32.exe 92 PID 2460 wrote to memory of 1548 2460 rundll32.exe 92 PID 2460 wrote to memory of 3872 2460 rundll32.exe 93 PID 2460 wrote to memory of 3872 2460 rundll32.exe 93 PID 2460 wrote to memory of 3872 2460 rundll32.exe 93 PID 2460 wrote to memory of 2424 2460 rundll32.exe 94 PID 2460 wrote to memory of 2424 2460 rundll32.exe 94 PID 2460 wrote to memory of 2424 2460 rundll32.exe 94 PID 2460 wrote to memory of 3164 2460 rundll32.exe 95 PID 2460 wrote to memory of 3164 2460 rundll32.exe 95 PID 2460 wrote to memory of 3164 2460 rundll32.exe 95 PID 2460 wrote to memory of 3468 2460 rundll32.exe 96 PID 2460 wrote to memory of 3468 2460 rundll32.exe 96 PID 2460 wrote to memory of 3468 2460 rundll32.exe 96 PID 2460 wrote to memory of 2632 2460 rundll32.exe 97 PID 2460 wrote to memory of 2632 2460 rundll32.exe 97 PID 2460 wrote to memory of 2632 2460 rundll32.exe 97 PID 2460 wrote to memory of 1308 2460 rundll32.exe 98 PID 2460 wrote to memory of 1308 2460 rundll32.exe 98 PID 2460 wrote to memory of 1308 2460 rundll32.exe 98 PID 2460 wrote to memory of 2440 2460 rundll32.exe 99 PID 2460 wrote to memory of 2440 2460 rundll32.exe 99 PID 2460 wrote to memory of 2440 2460 rundll32.exe 99 PID 2460 wrote to memory of 1192 2460 rundll32.exe 100 PID 2460 wrote to memory of 1192 2460 rundll32.exe 100 PID 2460 wrote to memory of 1192 2460 rundll32.exe 100 PID 2460 wrote to memory of 3224 2460 rundll32.exe 101 PID 2460 wrote to memory of 3224 2460 rundll32.exe 101 PID 2460 wrote to memory of 3224 2460 rundll32.exe 101 PID 2460 wrote to memory of 3132 2460 rundll32.exe 102 PID 2460 wrote to memory of 3132 2460 rundll32.exe 102 PID 2460 wrote to memory of 3132 2460 rundll32.exe 102
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3dc27b5f607a81c065e86bcfa27e35cc48c585fdb62f24bc6a9141460a14698b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3dc27b5f607a81c065e86bcfa27e35cc48c585fdb62f24bc6a9141460a14698b.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\svchost.exesvchost.exe fagahawhawhgawccc3⤵PID:3396
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe fagahawhawhgawccc3⤵PID:2240
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe fagahawhawhgawccc3⤵PID:3952
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe fagahawhawhgawccc3⤵PID:4488
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe fagahawhawhgawccc3⤵PID:1584
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe fagahawhawhgawccc3⤵PID:4104
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe fagahawhawhgawccc3⤵PID:5080
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe fagahawhawhgawccc3⤵PID:8
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe fagahawhawhgawccc3⤵PID:1560
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe fagahawhawhgawccc3⤵PID:1548
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe fagahawhawhgawccc3⤵PID:3872
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe fagahawhawhgawccc3⤵PID:2424
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe fagahawhawhgawccc3⤵PID:3164
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe fagahawhawhgawccc3⤵PID:3468
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe fagahawhawhgawccc3⤵PID:2632
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe fagahawhawhgawccc3⤵PID:1308
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe fagahawhawhgawccc3⤵PID:2440
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe fagahawhawhgawccc3⤵PID:1192
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe fagahawhawhgawccc3⤵PID:3224
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe fagahawhawhgawccc3⤵PID:3132
-
-