Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30/12/2024, 23:37
Static task
static1
Behavioral task
behavioral1
Sample
Ա취()/python38.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Ա취()/python38.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Ա취()/Ա취().exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Ա취()/Ա취().exe
Resource
win10v2004-20241007-en
General
-
Target
Ա취()/python38.dll
-
Size
111KB
-
MD5
df9f1665c7b75437790841a2b21d7aca
-
SHA1
4a8631594dd0d3e40e70901f6b56f7ab4a6dd704
-
SHA256
016f5c2ad31ce6d6ee68192a9937b832bb120fca7ffac71c8fc34b4c5e049f10
-
SHA512
0e02d9af1a588de7691e7330fc16fbb51a5f9034aa7138c1e39942dbed1e21f352fde9ca31df5c5304ac79df11c49565298fdd24120e13c4bde62f0322404ad9
-
SSDEEP
3072:RFoFeSgfuvuKg0rLIGqhjO8kWh9YWUUQqokd1vP8zsMDX:YgfnyIGq9BLYvUQOMDX
Malware Config
Extracted
metasploit
windows/download_exec
http://1.13.5.159:443/static-directory/dz.mp3
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1600 set thread context of 1072 1600 rundll32.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2196 wrote to memory of 1600 2196 rundll32.exe 30 PID 2196 wrote to memory of 1600 2196 rundll32.exe 30 PID 2196 wrote to memory of 1600 2196 rundll32.exe 30 PID 2196 wrote to memory of 1600 2196 rundll32.exe 30 PID 2196 wrote to memory of 1600 2196 rundll32.exe 30 PID 2196 wrote to memory of 1600 2196 rundll32.exe 30 PID 2196 wrote to memory of 1600 2196 rundll32.exe 30 PID 1600 wrote to memory of 1072 1600 rundll32.exe 31 PID 1600 wrote to memory of 1072 1600 rundll32.exe 31 PID 1600 wrote to memory of 1072 1600 rundll32.exe 31 PID 1600 wrote to memory of 1072 1600 rundll32.exe 31 PID 1600 wrote to memory of 1072 1600 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Ա취()\python38.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Ա취()\python38.dll,#12⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:1072
-
-