Analysis
-
max time kernel
130s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 16:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
168f29f10d9d5bace166fe82fe0ae1d63e4de0658bc21e606e615e34f4555ab2.dll
Resource
win7-20240705-en
windows7-x64
3 signatures
150 seconds
General
-
Target
168f29f10d9d5bace166fe82fe0ae1d63e4de0658bc21e606e615e34f4555ab2.dll
-
Size
181KB
-
MD5
2b158e10981db4362648ff36f5050a32
-
SHA1
3c7559077170be28f204722fced4508626cca3ec
-
SHA256
168f29f10d9d5bace166fe82fe0ae1d63e4de0658bc21e606e615e34f4555ab2
-
SHA512
df169a20551cc5e30a0b258b96641486a9404d49f8f397177a6f37738430ab8cca8b8a245a5572a7cca69d2a6bb87afeb0edaaf701e025e16837c8ad681beff7
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0R:jDgtfRQUHPw06MoV2nwTBlhm8Z
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4900 wrote to memory of 2132 4900 rundll32.exe 84 PID 4900 wrote to memory of 2132 4900 rundll32.exe 84 PID 4900 wrote to memory of 2132 4900 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\168f29f10d9d5bace166fe82fe0ae1d63e4de0658bc21e606e615e34f4555ab2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\168f29f10d9d5bace166fe82fe0ae1d63e4de0658bc21e606e615e34f4555ab2.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2132
-