Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
19/03/2025, 17:33
Behavioral task
behavioral1
Sample
7031c032fa8275a8c547fac187dc0a04041121a57c9c616fdc068c069ee460e8.dll
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
7031c032fa8275a8c547fac187dc0a04041121a57c9c616fdc068c069ee460e8.dll
Resource
win10v2004-20250314-en
General
-
Target
7031c032fa8275a8c547fac187dc0a04041121a57c9c616fdc068c069ee460e8.dll
-
Size
160KB
-
MD5
05c528a2b8bb20aad901c733d146d595
-
SHA1
ac8a2264d4adba9afd1944cd902923fcfa334e3c
-
SHA256
7031c032fa8275a8c547fac187dc0a04041121a57c9c616fdc068c069ee460e8
-
SHA512
1f9f3d38ce7df39093b924dadc241e7ec6ce23f06aa06d8d571e7c1c0d6b438dab05dd476b676f9948fd127c45fa774a7f2e16752464692583b230810521e6ed
-
SSDEEP
3072:Lw0AGKwe5jCHKHbmE+xNTYzYorxsFUtTBfn398t5UfDE:806we5jWSmEWNTYzfuOtTBV8tiL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2596 wrote to memory of 1460 2596 rundll32.exe 30 PID 2596 wrote to memory of 1460 2596 rundll32.exe 30 PID 2596 wrote to memory of 1460 2596 rundll32.exe 30 PID 2596 wrote to memory of 1460 2596 rundll32.exe 30 PID 2596 wrote to memory of 1460 2596 rundll32.exe 30 PID 2596 wrote to memory of 1460 2596 rundll32.exe 30 PID 2596 wrote to memory of 1460 2596 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7031c032fa8275a8c547fac187dc0a04041121a57c9c616fdc068c069ee460e8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7031c032fa8275a8c547fac187dc0a04041121a57c9c616fdc068c069ee460e8.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1460
-