Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19/03/2025, 17:26
Behavioral task
behavioral1
Sample
013a681ff8c09b5fab6218f4aa493627652c9ec7c6ba88291980b6e00e151201.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
013a681ff8c09b5fab6218f4aa493627652c9ec7c6ba88291980b6e00e151201.dll
Resource
win10v2004-20250314-en
General
-
Target
013a681ff8c09b5fab6218f4aa493627652c9ec7c6ba88291980b6e00e151201.dll
-
Size
152KB
-
MD5
feb49021233524bd64eb6ce37359c425
-
SHA1
c9589bfc35950fd3d46f582ca428c987d819e27d
-
SHA256
013a681ff8c09b5fab6218f4aa493627652c9ec7c6ba88291980b6e00e151201
-
SHA512
be0b0d2dfc87a10df4914038256410d1e225200174c31b91c7fe814f68278e620d9ed91463ec05617522fd072ac3442b6438737f418f4386afbd0795691de240
-
SSDEEP
3072:ZKIloRj5k4WvRcdqFfn7N1HGXyyf/dBWrr4IHtTBf9av9wPZ6frb:EKaj5k1NFf7N1HGXyyN0IIHtTB41wPQD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3036 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2732 wrote to memory of 3036 2732 rundll32.exe 30 PID 2732 wrote to memory of 3036 2732 rundll32.exe 30 PID 2732 wrote to memory of 3036 2732 rundll32.exe 30 PID 2732 wrote to memory of 3036 2732 rundll32.exe 30 PID 2732 wrote to memory of 3036 2732 rundll32.exe 30 PID 2732 wrote to memory of 3036 2732 rundll32.exe 30 PID 2732 wrote to memory of 3036 2732 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\013a681ff8c09b5fab6218f4aa493627652c9ec7c6ba88291980b6e00e151201.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\013a681ff8c09b5fab6218f4aa493627652c9ec7c6ba88291980b6e00e151201.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3036
-