Analysis
-
max time kernel
103s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 02:47
Static task
static1
Behavioral task
behavioral1
Sample
5c8431be6836f5e3be12c8585465f210N.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5c8431be6836f5e3be12c8585465f210N.dll
Resource
win10v2004-20240709-en
General
-
Target
5c8431be6836f5e3be12c8585465f210N.dll
-
Size
145KB
-
MD5
5c8431be6836f5e3be12c8585465f210
-
SHA1
b3f06e3b0018fe8c4e71a6197aa10be08e4a701c
-
SHA256
40196e8d9b5915d3e7b2d7396e2a61423eec6c03696a4443d42a6a3c94e768dd
-
SHA512
66da3e9eefa382b72f1da71ccf8ded9750aedf9a0c1b5cfe95e48b23e3ebc5b4168a008cf1f5f2dee18864ffaa222b9f48bb89b415d95f14a0a562a61d9ac3cf
-
SSDEEP
3072:zeKAMuRbSwy6N/7/nYCmoVeihpOwsoItXBJW1ccjFl0W3:qDzLaihpOH7Wvl13
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5080 wrote to memory of 3200 5080 rundll32.exe 84 PID 5080 wrote to memory of 3200 5080 rundll32.exe 84 PID 5080 wrote to memory of 3200 5080 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5c8431be6836f5e3be12c8585465f210N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5c8431be6836f5e3be12c8585465f210N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3200
-