Analysis
-
max time kernel
109s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 06:37
Static task
static1
Behavioral task
behavioral1
Sample
92c8af2cd93b93a02019c68ea99c7100N.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
92c8af2cd93b93a02019c68ea99c7100N.dll
Resource
win10v2004-20240709-en
General
-
Target
92c8af2cd93b93a02019c68ea99c7100N.dll
-
Size
317KB
-
MD5
92c8af2cd93b93a02019c68ea99c7100
-
SHA1
da449f9b6b11ab49f38adfe33e8bcc2f75ae24bf
-
SHA256
8b587228dc8e29a643d3d25a271e99160e1296b48f947e5e0da2b75df374a48a
-
SHA512
0f76c4db81f1ab80687372accacfd41eae28510276a752ec5b9b57f39917e75ea959024c57a1f890e8d4c813afd696812f42e71b7852bedf1105a96028c57826
-
SSDEEP
6144:zmWoza0a1IMVVEb3uqRpwIUV9lMYmFQqZRRphLuVucfb8ehbjN8wS21bKRTw4f3i:zmWQa0a1IMVr9eMqbRzLuVucfb8ehbjH
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 404 wrote to memory of 2804 404 rundll32.exe 84 PID 404 wrote to memory of 2804 404 rundll32.exe 84 PID 404 wrote to memory of 2804 404 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\92c8af2cd93b93a02019c68ea99c7100N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\92c8af2cd93b93a02019c68ea99c7100N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2804
-