Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 23:08
Static task
static1
Behavioral task
behavioral1
Sample
27a78f57aa4f05ff67a9291adb4d6650N.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
27a78f57aa4f05ff67a9291adb4d6650N.dll
Resource
win10v2004-20240709-en
General
-
Target
27a78f57aa4f05ff67a9291adb4d6650N.dll
-
Size
4.6MB
-
MD5
27a78f57aa4f05ff67a9291adb4d6650
-
SHA1
e889619b075beeacd56fd3615f4f0cc83a475b29
-
SHA256
866c5a1f26ad8caa1e36a59d3723650ba60189cddaddd9d0df18feda59c51ce3
-
SHA512
bae54ab0c5adcbec75bf094ca6769be01248ef9cdecff65824bf77064fba808d66813556fd7b4d0e1a023250d0335911de6883cbfdf1c43f153a95d9a2101e4e
-
SSDEEP
98304:NPMvLNHzP6JliHXLa41RaywJkwon+AoQ69fYWF8irG4FjXLPp:NiiMHr1R12kOAFSYAhHXLh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2632 2640 rundll32.exe 84 PID 2640 wrote to memory of 2632 2640 rundll32.exe 84 PID 2640 wrote to memory of 2632 2640 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\27a78f57aa4f05ff67a9291adb4d6650N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\27a78f57aa4f05ff67a9291adb4d6650N.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2632
-