Analysis
-
max time kernel
102s -
max time network
104s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
17/04/2025, 01:40
Behavioral task
behavioral1
Sample
f581c7a38fabd5649256200e240e0c096ab74da9e47008faf4c512fb2cb73b5d.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
f581c7a38fabd5649256200e240e0c096ab74da9e47008faf4c512fb2cb73b5d.dll
Resource
win11-20250410-en
General
-
Target
f581c7a38fabd5649256200e240e0c096ab74da9e47008faf4c512fb2cb73b5d.dll
-
Size
81KB
-
MD5
3d9e156bdb2cc2c08f7b1daa70a9a6ea
-
SHA1
7b7ed486b3624ffc6213be27aebc7c7b450eb3c1
-
SHA256
f581c7a38fabd5649256200e240e0c096ab74da9e47008faf4c512fb2cb73b5d
-
SHA512
ab812fc20f8302767f83b99fb2f717aa730845fe433135233d058ccb3e4878ed414faf55f60667c3de9b3fecc2d7cc837bf5446930fcce3d84efd1dd86707fca
-
SSDEEP
1536:cAun6l5HSFNZ6E/vwkCJjnih3H7oNHTsWSscdy9aViJE5P:zuwHcNZ7wk3MtItyEiJE5
Malware Config
Extracted
metasploit
windows/download_exec
http://154.23.185.224:10330/jquery-3.3.1.slim.min.js
- headers Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Referer: http://code.jquery.com/ Accept-Encoding: gzip, deflate User-Agent: Mozilla/5.0 (Windows NT 6.3; Trident/7.0; rv:11.0) like Gecko
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 1 5528 rundll32.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3272 set thread context of 5528 3272 rundll32.exe 79 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1216 wrote to memory of 3272 1216 rundll32.exe 78 PID 1216 wrote to memory of 3272 1216 rundll32.exe 78 PID 1216 wrote to memory of 3272 1216 rundll32.exe 78 PID 3272 wrote to memory of 5528 3272 rundll32.exe 79 PID 3272 wrote to memory of 5528 3272 rundll32.exe 79 PID 3272 wrote to memory of 5528 3272 rundll32.exe 79 PID 3272 wrote to memory of 5528 3272 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f581c7a38fabd5649256200e240e0c096ab74da9e47008faf4c512fb2cb73b5d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f581c7a38fabd5649256200e240e0c096ab74da9e47008faf4c512fb2cb73b5d.dll,#12⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe3⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:5528
-
-