Overview
overview
10Static
static
3DBDownloader.exe
windows7-x64
10DBDownloader.exe
windows10-2004-x64
10Zip.dll
windows7-x64
3Zip.dll
windows10-2004-x64
3madBasic_.dll
windows7-x64
3madBasic_.dll
windows10-2004-x64
3madDisAsm_.dll
windows7-x64
3madDisAsm_.dll
windows10-2004-x64
3madExcept_.dll
windows7-x64
3madExcept_.dll
windows10-2004-x64
3rtl120.dll
windows7-x64
3rtl120.dll
windows10-2004-x64
3vcl120.dll
windows7-x64
3vcl120.dll
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2025 17:30
Static task
static1
Behavioral task
behavioral1
Sample
DBDownloader.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
DBDownloader.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Zip.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Zip.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
madBasic_.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
madBasic_.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
madDisAsm_.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
madDisAsm_.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
madExcept_.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
madExcept_.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
rtl120.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
rtl120.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
vcl120.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
vcl120.dll
Resource
win10v2004-20241007-en
General
-
Target
madDisAsm_.dll
-
Size
64KB
-
MD5
3936a92320f7d4cec5fa903c200911c7
-
SHA1
a61602501ffebf8381e39015d1725f58938154ca
-
SHA256
2aec41414aca38de5aba1cab7bda2030e1e2b347e0ae77079533722c85fe4566
-
SHA512
747ea892f6e5e3b7500c363d40c5c2a62e9fcf898ade2648262a4277ad3b31e0bcd5f8672d79d176b4759790db688bf1a748b09cbcb1816288a44554016e46d3
-
SSDEEP
1536:LNy3eqMne0sXB0IWtCLwEJhY0w1VmLPx5wdB3htW:LqMnfIB04LwEJhY0w16xAFW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1780 wrote to memory of 3836 1780 rundll32.exe 82 PID 1780 wrote to memory of 3836 1780 rundll32.exe 82 PID 1780 wrote to memory of 3836 1780 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\madDisAsm_.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\madDisAsm_.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3836
-