Analysis
-
max time kernel
103s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2025, 01:40
Behavioral task
behavioral1
Sample
f581c7a38fabd5649256200e240e0c096ab74da9e47008faf4c512fb2cb73b5d.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
f581c7a38fabd5649256200e240e0c096ab74da9e47008faf4c512fb2cb73b5d.dll
Resource
win11-20250410-en
General
-
Target
f581c7a38fabd5649256200e240e0c096ab74da9e47008faf4c512fb2cb73b5d.dll
-
Size
81KB
-
MD5
3d9e156bdb2cc2c08f7b1daa70a9a6ea
-
SHA1
7b7ed486b3624ffc6213be27aebc7c7b450eb3c1
-
SHA256
f581c7a38fabd5649256200e240e0c096ab74da9e47008faf4c512fb2cb73b5d
-
SHA512
ab812fc20f8302767f83b99fb2f717aa730845fe433135233d058ccb3e4878ed414faf55f60667c3de9b3fecc2d7cc837bf5446930fcce3d84efd1dd86707fca
-
SSDEEP
1536:cAun6l5HSFNZ6E/vwkCJjnih3H7oNHTsWSscdy9aViJE5P:zuwHcNZ7wk3MtItyEiJE5
Malware Config
Extracted
metasploit
windows/download_exec
http://154.23.185.224:10330/jquery-3.3.1.slim.min.js
- headers Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Referer: http://code.jquery.com/ Accept-Encoding: gzip, deflate User-Agent: Mozilla/5.0 (Windows NT 6.3; Trident/7.0; rv:11.0) like Gecko
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 1 1988 rundll32.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3956 set thread context of 1988 3956 rundll32.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1444 wrote to memory of 3956 1444 rundll32.exe 85 PID 1444 wrote to memory of 3956 1444 rundll32.exe 85 PID 1444 wrote to memory of 3956 1444 rundll32.exe 85 PID 3956 wrote to memory of 1988 3956 rundll32.exe 86 PID 3956 wrote to memory of 1988 3956 rundll32.exe 86 PID 3956 wrote to memory of 1988 3956 rundll32.exe 86 PID 3956 wrote to memory of 1988 3956 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f581c7a38fabd5649256200e240e0c096ab74da9e47008faf4c512fb2cb73b5d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f581c7a38fabd5649256200e240e0c096ab74da9e47008faf4c512fb2cb73b5d.dll,#12⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe3⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:1988
-
-