Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24/03/2025, 06:19
Behavioral task
behavioral1
Sample
1 (630).dll
Resource
win7-20241010-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
1 (630).dll
Resource
win10v2004-20250314-en
2 signatures
150 seconds
General
-
Target
1 (630).dll
-
Size
36KB
-
MD5
61db25bca695a1c99c91513dd0641660
-
SHA1
99863a4ac66d1556b8e54e6e95a96af4b4f450e8
-
SHA256
45b563e43851d80182a05da5a1cff0657c75dfba3bf70803f0cf7fbe99f2c06b
-
SHA512
dca2cfe9d7a65876136b2f6bb793eb3e1cc9e2736563f7d2e21c4dde28be4c7e9a0bd77704805a4e94b7930c7846ffcfe2a50ebc2c64620e9ece608f25e52323
-
SSDEEP
768:EYZiyYcpbEzlwF2g9ap4nLBFvpzbHyV6N55IHFKSu87W78aETvqtnqUHvBrLXvb4:EYZEcKzlwb9u4nLbvpzLy0N55IHFKSuc
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2012 3056 rundll32.exe 30 PID 3056 wrote to memory of 2012 3056 rundll32.exe 30 PID 3056 wrote to memory of 2012 3056 rundll32.exe 30 PID 3056 wrote to memory of 2012 3056 rundll32.exe 30 PID 3056 wrote to memory of 2012 3056 rundll32.exe 30 PID 3056 wrote to memory of 2012 3056 rundll32.exe 30 PID 3056 wrote to memory of 2012 3056 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\1 (630).dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\1 (630).dll",#12⤵
- System Location Discovery: System Language Discovery
PID:2012
-