Analysis
-
max time kernel
104s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 11:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
bb94b74960e3ca2f436df2f0fcdfbee0N.dll
Resource
win7-20240705-en
windows7-x64
3 signatures
120 seconds
General
-
Target
bb94b74960e3ca2f436df2f0fcdfbee0N.dll
-
Size
814KB
-
MD5
bb94b74960e3ca2f436df2f0fcdfbee0
-
SHA1
ec7c586549d718080bd0de3acfa692fc11b7d267
-
SHA256
4d9c9c354cad4b1e380ff846477b0378880257f6827d0715c5a7d8416b34f5a3
-
SHA512
40b94c39ede3166a06ab6cb9d9eb740cf7cd09c8062fa30c6fc4c8cad5a72eeab8697536a4ae5e88dfb7736485f1354e21961241bb8d458193c00934b97ffad6
-
SSDEEP
6144:o6C5AXbMn7UI1FoV2gwTBlrIckPJYYYYYYYYYYYYq:o6RI1Fo/wT3cJYYYYYYYYYYYYq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4556 wrote to memory of 1020 4556 rundll32.exe rundll32.exe PID 4556 wrote to memory of 1020 4556 rundll32.exe rundll32.exe PID 4556 wrote to memory of 1020 4556 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb94b74960e3ca2f436df2f0fcdfbee0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb94b74960e3ca2f436df2f0fcdfbee0N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1020