Analysis
-
max time kernel
96s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2024, 06:37
Static task
static1
Behavioral task
behavioral1
Sample
b067d608d5b9b1d312c5d4798efa57cb2bae0f36ea539854b42bb6ef5754f71f.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b067d608d5b9b1d312c5d4798efa57cb2bae0f36ea539854b42bb6ef5754f71f.dll
Resource
win10v2004-20241007-en
General
-
Target
b067d608d5b9b1d312c5d4798efa57cb2bae0f36ea539854b42bb6ef5754f71f.dll
-
Size
184KB
-
MD5
4a6059632251f11d6c61b272effe6cf8
-
SHA1
c114b70cfa36840fb3439d3e0b60e8235c8c052f
-
SHA256
b067d608d5b9b1d312c5d4798efa57cb2bae0f36ea539854b42bb6ef5754f71f
-
SHA512
b747362267590e0dbff7b6e81de6609b5801ef0a6e9d98feef961a3e408b86ea030f9c97c88dfe96eab3812d61b66b4fd24e30bb584198a1a31e423756892589
-
SSDEEP
1536:1d7zh6yaRfjdDZO+3KH+f7pYxuxgffbtorECnhc7cEsWM+cd36Sq1DCgRmd:1d7zobFjdVqeeuxgLtKE7QN36nZCgRq
Malware Config
Extracted
metasploit
windows/download_exec
http://culunk.com:443/image-directory/ak.gif
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2176 2652 rundll32.exe 82 PID 2652 wrote to memory of 2176 2652 rundll32.exe 82 PID 2652 wrote to memory of 2176 2652 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b067d608d5b9b1d312c5d4798efa57cb2bae0f36ea539854b42bb6ef5754f71f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b067d608d5b9b1d312c5d4798efa57cb2bae0f36ea539854b42bb6ef5754f71f.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2176
-