Analysis
-
max time kernel
93s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 10:50
Behavioral task
behavioral1
Sample
a3b2e0301aa2339298711bc117e1820c3e52dd8259eb0fbb4c9b2bef69032e6a.dll
Resource
win7-20241010-en
15 signatures
150 seconds
General
-
Target
a3b2e0301aa2339298711bc117e1820c3e52dd8259eb0fbb4c9b2bef69032e6a.dll
-
Size
430KB
-
MD5
c7db6d02efd1706edee4bb150185ff53
-
SHA1
5e51254ba2465ed007c7140b4a10903d45b5d45c
-
SHA256
a3b2e0301aa2339298711bc117e1820c3e52dd8259eb0fbb4c9b2bef69032e6a
-
SHA512
860e25d96a9cca5a9f2578f560d94d13e03c0724a19093f34bcc3d4aad4d85cdd8f0327beabd2d07bfbba74efed58066c11e073ab15a0ae9f0f104e2e6e2ef81
-
SSDEEP
12288:q9j8pWxJdNxnSJwu416c9y0wiL7s1T37AVu68VnogfN7oSC:q9I+dGwu13UVb+n3fNM
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2164-0-0x0000000010000000-0x00000000100FE000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 4404 wrote to memory of 2164 4404 rundll32.exe 82 PID 4404 wrote to memory of 2164 4404 rundll32.exe 82 PID 4404 wrote to memory of 2164 4404 rundll32.exe 82 PID 2164 wrote to memory of 4736 2164 rundll32.exe 83 PID 2164 wrote to memory of 4736 2164 rundll32.exe 83 PID 2164 wrote to memory of 4736 2164 rundll32.exe 83 PID 2164 wrote to memory of 4260 2164 rundll32.exe 84 PID 2164 wrote to memory of 4260 2164 rundll32.exe 84 PID 2164 wrote to memory of 4260 2164 rundll32.exe 84 PID 2164 wrote to memory of 2304 2164 rundll32.exe 85 PID 2164 wrote to memory of 2304 2164 rundll32.exe 85 PID 2164 wrote to memory of 2304 2164 rundll32.exe 85 PID 2164 wrote to memory of 2248 2164 rundll32.exe 86 PID 2164 wrote to memory of 2248 2164 rundll32.exe 86 PID 2164 wrote to memory of 2248 2164 rundll32.exe 86 PID 2164 wrote to memory of 2200 2164 rundll32.exe 87 PID 2164 wrote to memory of 2200 2164 rundll32.exe 87 PID 2164 wrote to memory of 2200 2164 rundll32.exe 87 PID 2164 wrote to memory of 3528 2164 rundll32.exe 88 PID 2164 wrote to memory of 3528 2164 rundll32.exe 88 PID 2164 wrote to memory of 3528 2164 rundll32.exe 88 PID 2164 wrote to memory of 4556 2164 rundll32.exe 89 PID 2164 wrote to memory of 4556 2164 rundll32.exe 89 PID 2164 wrote to memory of 4556 2164 rundll32.exe 89 PID 2164 wrote to memory of 3660 2164 rundll32.exe 90 PID 2164 wrote to memory of 3660 2164 rundll32.exe 90 PID 2164 wrote to memory of 3660 2164 rundll32.exe 90 PID 2164 wrote to memory of 2096 2164 rundll32.exe 91 PID 2164 wrote to memory of 2096 2164 rundll32.exe 91 PID 2164 wrote to memory of 2096 2164 rundll32.exe 91 PID 2164 wrote to memory of 2640 2164 rundll32.exe 92 PID 2164 wrote to memory of 2640 2164 rundll32.exe 92 PID 2164 wrote to memory of 2640 2164 rundll32.exe 92 PID 2164 wrote to memory of 3904 2164 rundll32.exe 93 PID 2164 wrote to memory of 3904 2164 rundll32.exe 93 PID 2164 wrote to memory of 3904 2164 rundll32.exe 93 PID 2164 wrote to memory of 512 2164 rundll32.exe 94 PID 2164 wrote to memory of 512 2164 rundll32.exe 94 PID 2164 wrote to memory of 512 2164 rundll32.exe 94 PID 2164 wrote to memory of 2424 2164 rundll32.exe 95 PID 2164 wrote to memory of 2424 2164 rundll32.exe 95 PID 2164 wrote to memory of 2424 2164 rundll32.exe 95 PID 2164 wrote to memory of 2136 2164 rundll32.exe 96 PID 2164 wrote to memory of 2136 2164 rundll32.exe 96 PID 2164 wrote to memory of 2136 2164 rundll32.exe 96 PID 2164 wrote to memory of 4572 2164 rundll32.exe 97 PID 2164 wrote to memory of 4572 2164 rundll32.exe 97 PID 2164 wrote to memory of 4572 2164 rundll32.exe 97 PID 2164 wrote to memory of 116 2164 rundll32.exe 98 PID 2164 wrote to memory of 116 2164 rundll32.exe 98 PID 2164 wrote to memory of 116 2164 rundll32.exe 98 PID 2164 wrote to memory of 1708 2164 rundll32.exe 99 PID 2164 wrote to memory of 1708 2164 rundll32.exe 99 PID 2164 wrote to memory of 1708 2164 rundll32.exe 99 PID 2164 wrote to memory of 4236 2164 rundll32.exe 100 PID 2164 wrote to memory of 4236 2164 rundll32.exe 100 PID 2164 wrote to memory of 4236 2164 rundll32.exe 100 PID 2164 wrote to memory of 2436 2164 rundll32.exe 101 PID 2164 wrote to memory of 2436 2164 rundll32.exe 101 PID 2164 wrote to memory of 2436 2164 rundll32.exe 101 PID 2164 wrote to memory of 4608 2164 rundll32.exe 102 PID 2164 wrote to memory of 4608 2164 rundll32.exe 102 PID 2164 wrote to memory of 4608 2164 rundll32.exe 102
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a3b2e0301aa2339298711bc117e1820c3e52dd8259eb0fbb4c9b2bef69032e6a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a3b2e0301aa2339298711bc117e1820c3e52dd8259eb0fbb4c9b2bef69032e6a.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\svchost.exesvchost.exe fagahawhawhgawccc3⤵PID:4736
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe fagahawhawhgawccc3⤵PID:4260
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe fagahawhawhgawccc3⤵PID:2304
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe fagahawhawhgawccc3⤵PID:2248
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe fagahawhawhgawccc3⤵PID:2200
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe fagahawhawhgawccc3⤵PID:3528
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe fagahawhawhgawccc3⤵PID:4556
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe fagahawhawhgawccc3⤵PID:3660
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe fagahawhawhgawccc3⤵PID:2096
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe fagahawhawhgawccc3⤵PID:2640
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe fagahawhawhgawccc3⤵PID:3904
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe fagahawhawhgawccc3⤵PID:512
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe fagahawhawhgawccc3⤵PID:2424
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe fagahawhawhgawccc3⤵PID:2136
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe fagahawhawhgawccc3⤵PID:4572
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe fagahawhawhgawccc3⤵PID:116
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe fagahawhawhgawccc3⤵PID:1708
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe fagahawhawhgawccc3⤵PID:4236
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe fagahawhawhgawccc3⤵PID:2436
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe fagahawhawhgawccc3⤵PID:4608
-
-