Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19/03/2025, 17:34
Behavioral task
behavioral1
Sample
a996e4c18ae4c4563db0767cb230b24279daeb3f62ee62b061d2ee076d81bdfd.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a996e4c18ae4c4563db0767cb230b24279daeb3f62ee62b061d2ee076d81bdfd.dll
Resource
win10v2004-20250314-en
General
-
Target
a996e4c18ae4c4563db0767cb230b24279daeb3f62ee62b061d2ee076d81bdfd.dll
-
Size
116KB
-
MD5
9c3f469a5b54fb2ec29ac7831780ed6d
-
SHA1
9e380cc51e33a9f1e6c3835eb77a1bf7e804e07b
-
SHA256
a996e4c18ae4c4563db0767cb230b24279daeb3f62ee62b061d2ee076d81bdfd
-
SHA512
4d65c6df5be1c282f8fe1de8db3fed930e26fec3bc3ed838befd08c80465bfb548ff0b185dd0873a7461784e89587b04357caa9bc4a35a884366b48603c55b23
-
SSDEEP
1536:01Pk0NR1wAJuATVg65YYloLx5c5xpp+awXmGVNuRcFnToIf3srTZuDP56W:YJuATOEYg5xP3wXmyN4ctTBfcrC56W
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2524 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1104 wrote to memory of 2524 1104 rundll32.exe 31 PID 1104 wrote to memory of 2524 1104 rundll32.exe 31 PID 1104 wrote to memory of 2524 1104 rundll32.exe 31 PID 1104 wrote to memory of 2524 1104 rundll32.exe 31 PID 1104 wrote to memory of 2524 1104 rundll32.exe 31 PID 1104 wrote to memory of 2524 1104 rundll32.exe 31 PID 1104 wrote to memory of 2524 1104 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a996e4c18ae4c4563db0767cb230b24279daeb3f62ee62b061d2ee076d81bdfd.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a996e4c18ae4c4563db0767cb230b24279daeb3f62ee62b061d2ee076d81bdfd.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2524
-