Analysis
-
max time kernel
92s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-08-2024 23:25
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
19aa9e5a8d4be8117a0acdcdf0073ed0N.dll
Resource
win10v2004-20240802-en
windows10-2004-x64
2 signatures
120 seconds
General
-
Target
19aa9e5a8d4be8117a0acdcdf0073ed0N.dll
-
Size
458KB
-
MD5
19aa9e5a8d4be8117a0acdcdf0073ed0
-
SHA1
e6a870102ba504e687e164e5a8c34b630a279a53
-
SHA256
4539479a152d79ec62cc0a485361422c2c8d3b5e00a73b73084ecc0a0e3d0368
-
SHA512
4c123142a3c2d5545a7d8299fb2b3e38eacc075b6a00851ab8281225520c8ec77043380de09f6c2c6de3cd90fab956c5dc0289f4c4f4df916504fe42a1de4f6a
-
SSDEEP
6144:qW+mIpIKPsQZoe5v0CwG+BLJJJeYfmpVDLT4fxLUe63W/vMpnX7Gqdihp3v7hhJC:deUBtJJeYfYqU8vwGdjhh7X
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1512 wrote to memory of 4032 1512 rundll32.exe 81 PID 1512 wrote to memory of 4032 1512 rundll32.exe 81 PID 1512 wrote to memory of 4032 1512 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\19aa9e5a8d4be8117a0acdcdf0073ed0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\19aa9e5a8d4be8117a0acdcdf0073ed0N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4032
-