Analysis
-
max time kernel
95s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2024 08:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a49c7e19c16c560cff02d319a33f9380N.dll
Resource
win7-20240704-en
windows7-x64
3 signatures
120 seconds
General
-
Target
a49c7e19c16c560cff02d319a33f9380N.dll
-
Size
545KB
-
MD5
a49c7e19c16c560cff02d319a33f9380
-
SHA1
9a4203f07de8fe027504cb34b598fde6f27abed4
-
SHA256
e3c21f4f82fbd60892d13ebc3407630d7beeb037ce1801aa1ad912a8f1c33206
-
SHA512
2d94d30647347421b4b0047ae7ff63cf5172b2fcf9c37bbe22a5e5384985e2abff7549bf740b325243dcc6960ce3781de69ffe555becd99a99a0eb9e85fbdb45
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0/:jDgtfRQUHPw06MoV2nwTBlhm8H
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4656 wrote to memory of 4440 4656 rundll32.exe 83 PID 4656 wrote to memory of 4440 4656 rundll32.exe 83 PID 4656 wrote to memory of 4440 4656 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a49c7e19c16c560cff02d319a33f9380N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a49c7e19c16c560cff02d319a33f9380N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4440
-