Analysis
-
max time kernel
139s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2024 11:02
Static task
static1
Behavioral task
behavioral1
Sample
6449188c27bbed532c260567037e4048d0072c0f3107d3eee5d0a57913623c7f.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
6449188c27bbed532c260567037e4048d0072c0f3107d3eee5d0a57913623c7f.dll
Resource
win11-20240709-en
General
-
Target
6449188c27bbed532c260567037e4048d0072c0f3107d3eee5d0a57913623c7f.dll
-
Size
1.7MB
-
MD5
fba868c22bd1a7075a290e11e713723a
-
SHA1
b1910b39de9718758a34fe28be44bd309071c4ad
-
SHA256
6449188c27bbed532c260567037e4048d0072c0f3107d3eee5d0a57913623c7f
-
SHA512
6ca1a9b5dcf6c058f820be2e060ebf525378374c9d2c52c2eb9af62205f88def0eddb11c10f95d6b1193758b388e499de82bdebcfc4eda214955ac1acce87c37
-
SSDEEP
49152:N9OzkFLO5+iH/4Dx6fTCjL6tkurc7CFJ39WWwGay0AewIpN05LM:3Ozkaqx6fTCf6t47CFzRNfCGI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1876 wrote to memory of 4220 1876 rundll32.exe 83 PID 1876 wrote to memory of 4220 1876 rundll32.exe 83 PID 1876 wrote to memory of 4220 1876 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6449188c27bbed532c260567037e4048d0072c0f3107d3eee5d0a57913623c7f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6449188c27bbed532c260567037e4048d0072c0f3107d3eee5d0a57913623c7f.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4220
-