Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 23:16
Static task
static1
Behavioral task
behavioral1
Sample
719467c0add9c715ed305bc2ff127ce7e294a11402e0b1da3698c0ee196167e8.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
719467c0add9c715ed305bc2ff127ce7e294a11402e0b1da3698c0ee196167e8.dll
Resource
win10v2004-20240709-en
General
-
Target
719467c0add9c715ed305bc2ff127ce7e294a11402e0b1da3698c0ee196167e8.dll
-
Size
7KB
-
MD5
5955e46533f54c92492f342cfbd02044
-
SHA1
125328978b6570df5bd8b657cd4c605bb8f179e7
-
SHA256
719467c0add9c715ed305bc2ff127ce7e294a11402e0b1da3698c0ee196167e8
-
SHA512
45365f773b14f7a4fde50235a5753f468d7552e0e36ad7ae90c2cd0a118fa5c25ebabccc003494d30264a1e883be6b83a3d4bac2ef0dcea9e9ea8a3596648569
-
SSDEEP
96:wb4VHccYJUC/aFbz/j0OvaPmd3cX5aXW:wUaJf/aFbP0OV2JaX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3144 wrote to memory of 2168 3144 rundll32.exe 84 PID 3144 wrote to memory of 2168 3144 rundll32.exe 84 PID 3144 wrote to memory of 2168 3144 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\719467c0add9c715ed305bc2ff127ce7e294a11402e0b1da3698c0ee196167e8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\719467c0add9c715ed305bc2ff127ce7e294a11402e0b1da3698c0ee196167e8.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2168
-