Analysis
-
max time kernel
103s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
28-07-2024 05:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
57bde21f32448b9daebef1bac295b510N.dll
Resource
win7-20240704-en
windows7-x64
3 signatures
120 seconds
General
-
Target
57bde21f32448b9daebef1bac295b510N.dll
-
Size
484KB
-
MD5
57bde21f32448b9daebef1bac295b510
-
SHA1
1f21a077557b682d8c5225ca2a9ff3d82d30d0a5
-
SHA256
f8b9763b4f13303236f17aea69cec9d9155bd4da0fa133f1864cf33049a77a2f
-
SHA512
116013347d8dbb0e47712f7114a3684418008746b0bb3874f6b14c95927e92fbe03ac6694f46e916c1dbe457c4938969a8cff418ee6f7c872643c56f7b692265
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0W:jDgtfRQUHPw06MoV2nwTBlhm8O
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 5056 wrote to memory of 5020 5056 rundll32.exe rundll32.exe PID 5056 wrote to memory of 5020 5056 rundll32.exe rundll32.exe PID 5056 wrote to memory of 5020 5056 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\57bde21f32448b9daebef1bac295b510N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\57bde21f32448b9daebef1bac295b510N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:5020