Analysis
-
max time kernel
100s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 07:26
Static task
static1
Behavioral task
behavioral1
Sample
9fcd1e7140d70e535b5408f2b9726e50N.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9fcd1e7140d70e535b5408f2b9726e50N.dll
Resource
win10v2004-20240709-en
General
-
Target
9fcd1e7140d70e535b5408f2b9726e50N.dll
-
Size
5KB
-
MD5
9fcd1e7140d70e535b5408f2b9726e50
-
SHA1
f63f4e9c67f0a2289d203f96fb4805722052f21d
-
SHA256
b5d1bdd3e21ed6e4b641181c17685d2dcd2c4b13123fa97478288fd5e6527c18
-
SHA512
4e2309b50e84856804df5305a9ff10cd27348ee38df5a264e73486abbc1994b7c8b87cb0bab5230f0c8a33f1d9445f3cf7dda944fd573c8d995468019ffceab8
-
SSDEEP
48:CCy86+Wet9Q/iooHeiefhe+/lSMYEqHNX+vgQX72v:hy859x0P8MaHl+oy72v
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4176 wrote to memory of 3060 4176 rundll32.exe 86 PID 4176 wrote to memory of 3060 4176 rundll32.exe 86 PID 4176 wrote to memory of 3060 4176 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9fcd1e7140d70e535b5408f2b9726e50N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9fcd1e7140d70e535b5408f2b9726e50N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3060
-