Analysis
-
max time kernel
102s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 14:43
Static task
static1
Behavioral task
behavioral1
Sample
d9c2fdfd2dd418ab1eecfb074d01f800N.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
d9c2fdfd2dd418ab1eecfb074d01f800N.dll
Resource
win10v2004-20240709-en
General
-
Target
d9c2fdfd2dd418ab1eecfb074d01f800N.dll
-
Size
327KB
-
MD5
d9c2fdfd2dd418ab1eecfb074d01f800
-
SHA1
823d089407b912b4db608ab4aa7462ba77c9c970
-
SHA256
65d13902b4a747ad184f26dfeb5c23ccbf29b394320491a8c3cc9cde4e6b9ad3
-
SHA512
0eaf66513dcd07dc16e6c736aac467bad51a52088b626d4ca225b0a283f43e42407ee8a32f2a09e0b60aa0f98c6b783dbaca7dce358c5b26c38b9197a860b0c0
-
SSDEEP
6144:EmWPDNND9yRPzLq+YXFqaZiMLic9kzVd7EAC48Ss9Ei:EmWhND9yJz+b1FcMLmp2AT8Ssd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 412 wrote to memory of 4124 412 rundll32.exe 83 PID 412 wrote to memory of 4124 412 rundll32.exe 83 PID 412 wrote to memory of 4124 412 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d9c2fdfd2dd418ab1eecfb074d01f800N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d9c2fdfd2dd418ab1eecfb074d01f800N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4124
-