Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2024, 07:00
Static task
static1
Behavioral task
behavioral1
Sample
5de0eef38d5fa811c8867dc907141f80N.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5de0eef38d5fa811c8867dc907141f80N.dll
Resource
win10v2004-20240709-en
General
-
Target
5de0eef38d5fa811c8867dc907141f80N.dll
-
Size
201KB
-
MD5
5de0eef38d5fa811c8867dc907141f80
-
SHA1
5bdc2625bc43c0de407483a2849aa6c4289004e1
-
SHA256
bff02afaee4749c46860d5510eb7445a6ef0afc5404f4f94f0d23ca4684e07b9
-
SHA512
88fbf6a61c7a784460bb5db2a7d142a7a19959355789413dcfbceb0069011dca819acf49e833d0c97ad63f6f75b01478c0f2964ff6fbfaa26a7aaf820e7b6ca6
-
SSDEEP
3072:a6CulfiwBcIDjQQTT+FB48xHGA2Q2oRsf9C/9m40LevCPAo:aqIy8Of98kfLevCI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3812 wrote to memory of 3328 3812 rundll32.exe 84 PID 3812 wrote to memory of 3328 3812 rundll32.exe 84 PID 3812 wrote to memory of 3328 3812 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5de0eef38d5fa811c8867dc907141f80N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5de0eef38d5fa811c8867dc907141f80N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3328
-