Analysis
-
max time kernel
103s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 22:14
Static task
static1
Behavioral task
behavioral1
Sample
19e501098dc2989c5869f23e6e276d10N.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
19e501098dc2989c5869f23e6e276d10N.dll
Resource
win10v2004-20240709-en
General
-
Target
19e501098dc2989c5869f23e6e276d10N.dll
-
Size
6KB
-
MD5
19e501098dc2989c5869f23e6e276d10
-
SHA1
fbeab4153380f05f4650ee6d0484bdf5fb00a1e1
-
SHA256
0cb9608acdf9a7746c2abc3a006d7a7ca982463f800027a7dd133f51ce2a09f2
-
SHA512
bf16d3cdbdeed01d7bf7de94e9bcbb284c8eb2c079495f2721cc1f59ca4238066889ca12015130aa04fab802fb79b4e940cf35db99df3ce2a2f77206377b766b
-
SSDEEP
48:CCy86+Wet9Q/iooHeiefhe+/lSMYEqat8HkLUV+60KkEfjz/zNlbgJhf3GkH2u7T:hy859x0P8MaOQdt0K5VhgJheYiRWUcw
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4760 wrote to memory of 3604 4760 rundll32.exe 84 PID 4760 wrote to memory of 3604 4760 rundll32.exe 84 PID 4760 wrote to memory of 3604 4760 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\19e501098dc2989c5869f23e6e276d10N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\19e501098dc2989c5869f23e6e276d10N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3604
-