Analysis
-
max time kernel
137s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 18:34
Static task
static1
Behavioral task
behavioral1
Sample
0966634f88322715366baca0f8c786c4f7004637fddcd2534cada7fa7d3e647e.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0966634f88322715366baca0f8c786c4f7004637fddcd2534cada7fa7d3e647e.dll
Resource
win10v2004-20240709-en
General
-
Target
0966634f88322715366baca0f8c786c4f7004637fddcd2534cada7fa7d3e647e.dll
-
Size
4KB
-
MD5
c28aaf48a7ee97caeb329125f7397b67
-
SHA1
767edf806ad11dd40c0b4b4b7504cb66c29a301c
-
SHA256
0966634f88322715366baca0f8c786c4f7004637fddcd2534cada7fa7d3e647e
-
SHA512
2909968031f2a8400c3a8242c545024129e8b7966068a74eaf719bf83b7347bc7f70b3ecffc62ffbc85082658bfeb9ee30e325f502c0327cf8beaad2173783b8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2136 wrote to memory of 936 2136 rundll32.exe 84 PID 2136 wrote to memory of 936 2136 rundll32.exe 84 PID 2136 wrote to memory of 936 2136 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0966634f88322715366baca0f8c786c4f7004637fddcd2534cada7fa7d3e647e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0966634f88322715366baca0f8c786c4f7004637fddcd2534cada7fa7d3e647e.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:936
-