Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2024 08:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
9845331b40f0fd15776b539ba21ba2d0N.dll
Resource
win7-20240729-en
windows7-x64
3 signatures
120 seconds
General
-
Target
9845331b40f0fd15776b539ba21ba2d0N.dll
-
Size
618KB
-
MD5
9845331b40f0fd15776b539ba21ba2d0
-
SHA1
6bfd01f4ef8e77379a6b45d848958d6fbd932869
-
SHA256
d5f870cd290cf38f7bcb2101f27cf42a119c349b86ba0e1afa699d8c63e83191
-
SHA512
b95287f341025aef34185b53b3eb3804de255ec490e225b4e664ec846193a97cb7ff0a1023a821ff179f679afedb11cfb0d0d9cdf3e0f775907950ed19d4ba68
-
SSDEEP
6144:o6C5AXbMn7UI1FoV2gwTBlrIckPJYYYYYYYYYYYYv:o6RI1Fo/wT3cJYYYYYYYYYYYYv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4784 wrote to memory of 4572 4784 rundll32.exe 81 PID 4784 wrote to memory of 4572 4784 rundll32.exe 81 PID 4784 wrote to memory of 4572 4784 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9845331b40f0fd15776b539ba21ba2d0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9845331b40f0fd15776b539ba21ba2d0N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4572
-