Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 03:32
Behavioral task
behavioral1
Sample
LEX2.dll
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
LEX2.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
LEX2.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
LEX2.exe
Resource
win10v2004-20250314-en
General
-
Target
LEX2.dll
-
Size
208KB
-
MD5
7cdf8999a50a34f50971a1c50bfae4bc
-
SHA1
1d972e66425f5a118dc3f9eac26439cc80d3af80
-
SHA256
5f82d1d4ec944e7d9951c09d0c82e8e8e552c8ba57139cecb87c65b151c1300c
-
SHA512
697d2bc09a43d6c52d725c41caf1bec219f18691c5ec74b2fccdac992fb8a5a1c354d2730ff20cbb5229642947770c028ee90461724fa12a65b41e9ee3d89565
-
SSDEEP
6144:yrxt8hEgJ5o3T6cI98gWNlPTGQQm6agrdGG66:y+h56T6uNtTirdB
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2096 2344 rundll32.exe 30 PID 2344 wrote to memory of 2096 2344 rundll32.exe 30 PID 2344 wrote to memory of 2096 2344 rundll32.exe 30 PID 2344 wrote to memory of 2096 2344 rundll32.exe 30 PID 2344 wrote to memory of 2096 2344 rundll32.exe 30 PID 2344 wrote to memory of 2096 2344 rundll32.exe 30 PID 2344 wrote to memory of 2096 2344 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\LEX2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\LEX2.dll,#12⤵
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:2096
-