Analysis
-
max time kernel
104s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 07:10
Static task
static1
Behavioral task
behavioral1
Sample
a5f80053921d039007c39fec44df2560N.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a5f80053921d039007c39fec44df2560N.dll
Resource
win10v2004-20240709-en
General
-
Target
a5f80053921d039007c39fec44df2560N.dll
-
Size
6KB
-
MD5
a5f80053921d039007c39fec44df2560
-
SHA1
1b3a696362c37bbf043a33dada6cde42a4642cb6
-
SHA256
93f12ec4ea470660d4e45e3a213ef19e35e21b46f133800a19e778c0ea0ae471
-
SHA512
5020b5a6c9594dcadbad8d70ca5fa4463baff08be9e454b749e3a5ca614fc894b5b8c1b58e1e7e4b0586aeb5a761dcb88b37113e5aecc717b07408d845f360e2
-
SSDEEP
96:DixZjmjtjd8jPjcZGR5TIyQtt6nwyo+G7W6axQEMtaqVTPggoVYHb+9wPMb:unSR6bgYBQtt6nBUWpm5cqRiVxK0b
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4572 wrote to memory of 3624 4572 rundll32.exe 84 PID 4572 wrote to memory of 3624 4572 rundll32.exe 84 PID 4572 wrote to memory of 3624 4572 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a5f80053921d039007c39fec44df2560N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a5f80053921d039007c39fec44df2560N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3624
-