Analysis
-
max time kernel
102s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 02:53
Static task
static1
Behavioral task
behavioral1
Sample
5e300ec98598b028ca1898abdf7cacf0N.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5e300ec98598b028ca1898abdf7cacf0N.dll
Resource
win10v2004-20240709-en
General
-
Target
5e300ec98598b028ca1898abdf7cacf0N.dll
-
Size
7KB
-
MD5
5e300ec98598b028ca1898abdf7cacf0
-
SHA1
5c1e900a8b3af39fa68a94b9ea95570c1c320a1f
-
SHA256
f358df028037774234806050e5a5554f48647d852347d1f884a12e480b2584f9
-
SHA512
3d12bb30f2e0b30b7a9c0b4edaf457a3af57dd18fb2cf8ab0d2fe5b3433ac1874a13e7389aac334724ceb31c3b9bccd267773c5c8bb49635c28e4761838415c9
-
SSDEEP
48:66ay5YVO3EVkApc2wp8hH1NZn5EquglQ067YbPW4bABbgL3q9J5S2hmc:b3EVkApcX4Hiv0hbPyq3qX5S2hV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4192 wrote to memory of 3576 4192 rundll32.exe 84 PID 4192 wrote to memory of 3576 4192 rundll32.exe 84 PID 4192 wrote to memory of 3576 4192 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5e300ec98598b028ca1898abdf7cacf0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5e300ec98598b028ca1898abdf7cacf0N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3576
-