Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-01-2025 09:12
Behavioral task
behavioral1
Sample
e5441ec40bb22b124875ce00fb68b36b917eb2995c39bac18fdddbb7efc05681.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e5441ec40bb22b124875ce00fb68b36b917eb2995c39bac18fdddbb7efc05681.dll
Resource
win10v2004-20241007-en
General
-
Target
e5441ec40bb22b124875ce00fb68b36b917eb2995c39bac18fdddbb7efc05681.dll
-
Size
329KB
-
MD5
a7a411f6e65a2b92f94203954f2e0505
-
SHA1
adf90a66fc6298d09e9fd34d75db6d1e91883f60
-
SHA256
e5441ec40bb22b124875ce00fb68b36b917eb2995c39bac18fdddbb7efc05681
-
SHA512
4ea856d87a4208dbce2bb34f6ef315297202475a47315b4a45860db3dd61cbe425c0b97fa21d254e6704ffdbd6e5c4cbd1b6538b129542a5dfd8ec0c0ca405a9
-
SSDEEP
6144:RmWhxR1arY/PbgmFOabPIIBhJXAv7eTY9suz0xhttGSrDKE3KIvSka8b1:RmWTR1arYnEKosuzY34CZ3DvSkN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2740 2484 rundll32.exe 30 PID 2484 wrote to memory of 2740 2484 rundll32.exe 30 PID 2484 wrote to memory of 2740 2484 rundll32.exe 30 PID 2484 wrote to memory of 2740 2484 rundll32.exe 30 PID 2484 wrote to memory of 2740 2484 rundll32.exe 30 PID 2484 wrote to memory of 2740 2484 rundll32.exe 30 PID 2484 wrote to memory of 2740 2484 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e5441ec40bb22b124875ce00fb68b36b917eb2995c39bac18fdddbb7efc05681.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e5441ec40bb22b124875ce00fb68b36b917eb2995c39bac18fdddbb7efc05681.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2740
-