Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 21:10
Static task
static1
Behavioral task
behavioral1
Sample
21eb581716d1ccfe31a3f63dfa182ccfe39555a3fb6c59d0fed874191d58f96c.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
21eb581716d1ccfe31a3f63dfa182ccfe39555a3fb6c59d0fed874191d58f96c.dll
Resource
win10v2004-20240730-en
General
-
Target
21eb581716d1ccfe31a3f63dfa182ccfe39555a3fb6c59d0fed874191d58f96c.dll
-
Size
3KB
-
MD5
1ecab9620fa8918670ad3e9deff16ece
-
SHA1
4ec1703a6c54117418fafeaea2fc63cb81ac9738
-
SHA256
21eb581716d1ccfe31a3f63dfa182ccfe39555a3fb6c59d0fed874191d58f96c
-
SHA512
444606919f0f614225bb3b7720aa71a127bb122a02058c1d968678b394ef0e11f1edefb9c5dc31b3d2e683bc3a8f8ceb9023b4c1b928c0e52cb899d6a23deeac
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4008 wrote to memory of 4488 4008 rundll32.exe 83 PID 4008 wrote to memory of 4488 4008 rundll32.exe 83 PID 4008 wrote to memory of 4488 4008 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\21eb581716d1ccfe31a3f63dfa182ccfe39555a3fb6c59d0fed874191d58f96c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\21eb581716d1ccfe31a3f63dfa182ccfe39555a3fb6c59d0fed874191d58f96c.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4488
-