Overview
overview
10Static
static
10Loader/Loader.exe
windows7-x64
10Loader/Loader.exe
windows10-2004-x64
10Loader/dmx...ls.dll
windows7-x64
1Loader/dmx...ls.dll
windows10-2004-x64
1Loader/lik...er.dll
windows10-2004-x64
1Loader/samlib.dll
windows7-x64
1Loader/samlib.dll
windows10-2004-x64
1Loader/wdi.dll
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
278s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2025 17:38
Behavioral task
behavioral1
Sample
Loader/Loader.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Loader/Loader.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Loader/dmxmlhelputils.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Loader/dmxmlhelputils.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Loader/likodi/NotificationController.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
Loader/samlib.dll
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
Loader/samlib.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
Loader/wdi.dll
Resource
win10v2004-20241007-en
General
-
Target
Loader/wdi.dll
-
Size
86KB
-
MD5
7d326b235ab064ff70376f1d015cc084
-
SHA1
3b394e93ef206d30fafbf3202a5a63a4b6667580
-
SHA256
404dda0bdf9a6c1c61653cf7e965f504b3a3a3b662f88c906aaa19a9c3df160c
-
SHA512
f33face04507edd462b40dfd0771da3f241374c99fc956def9678a05c15bf5f8c945579006ab250646120a7f983fe4a57b55c93bdf921142f6464bc74fee2347
-
SSDEEP
1536:2xg+XurUE+dlamMsyhirFoNZ5MtDPQEInpF6qbTyuVKiRoTnd5Zatd2nZXBjVym4:2x5XXdMTsyhirFoNZ5MtDIBpFtvLASoy
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1880 wrote to memory of 4956 1880 rundll32.exe 83 PID 1880 wrote to memory of 4956 1880 rundll32.exe 83 PID 1880 wrote to memory of 4956 1880 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Loader\wdi.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Loader\wdi.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4956
-