Analysis
-
max time kernel
103s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 13:45
Static task
static1
Behavioral task
behavioral1
Sample
d5644be4d0ed0dede5185e2624caba90N.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d5644be4d0ed0dede5185e2624caba90N.dll
Resource
win10v2004-20240709-en
General
-
Target
d5644be4d0ed0dede5185e2624caba90N.dll
-
Size
6KB
-
MD5
d5644be4d0ed0dede5185e2624caba90
-
SHA1
ef14956702563f4d3d60a6f1a5f5a1938dd268a7
-
SHA256
a8be15102241678a569131024b42c99c415755ab1ca1491b43728dd4f994712e
-
SHA512
8f740f6b071318ef453e97dd3d98f8cc71dee731f272d14410851fae9ab706f37f83b9562567e037cb6e8f692f64cf7771d807079c8ba55397295d5b74c4ced7
-
SSDEEP
96:nEY2RrF1eqwi4/ApeW73EGGMhnWOUbXHDFiq85jP2:EHRh1eppoM23ElMNWZbXRl8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3992 wrote to memory of 2780 3992 rundll32.exe 84 PID 3992 wrote to memory of 2780 3992 rundll32.exe 84 PID 3992 wrote to memory of 2780 3992 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d5644be4d0ed0dede5185e2624caba90N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d5644be4d0ed0dede5185e2624caba90N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2780
-