Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/03/2025, 17:37
Behavioral task
behavioral1
Sample
772b61b5751e5a541fca4fd970563c5382a579fc621fbff4d8c9ed93adbdab99.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
772b61b5751e5a541fca4fd970563c5382a579fc621fbff4d8c9ed93adbdab99.dll
Resource
win10v2004-20250314-en
General
-
Target
772b61b5751e5a541fca4fd970563c5382a579fc621fbff4d8c9ed93adbdab99.dll
-
Size
101KB
-
MD5
60a92d76e96aaa0ec79b5081ddcc8a24
-
SHA1
295b298b02e247229ec17529222af34535be0fa1
-
SHA256
772b61b5751e5a541fca4fd970563c5382a579fc621fbff4d8c9ed93adbdab99
-
SHA512
7acbd1b19798865aa58f5efd90c3c669df556495ff9630f103f8936cf9e9f317c6c6ec706b95ce812cd6a56eb41b7fff1738f39bf2006798481c63761585dbb9
-
SSDEEP
1536:qr53CYUR1wmJkoSA53IXn85c5I9yHT0eRddORQFnToIf2ryZuhPZ6m:qEIC25afeDdYQtTBf2rPZ6m
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3040 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2956 wrote to memory of 3040 2956 rundll32.exe 31 PID 2956 wrote to memory of 3040 2956 rundll32.exe 31 PID 2956 wrote to memory of 3040 2956 rundll32.exe 31 PID 2956 wrote to memory of 3040 2956 rundll32.exe 31 PID 2956 wrote to memory of 3040 2956 rundll32.exe 31 PID 2956 wrote to memory of 3040 2956 rundll32.exe 31 PID 2956 wrote to memory of 3040 2956 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\772b61b5751e5a541fca4fd970563c5382a579fc621fbff4d8c9ed93adbdab99.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\772b61b5751e5a541fca4fd970563c5382a579fc621fbff4d8c9ed93adbdab99.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3040
-