Analysis
-
max time kernel
93s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-08-2024 23:50
Static task
static1
Behavioral task
behavioral1
Sample
1e41f709b8d0864da031169504aa07c0N.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
1e41f709b8d0864da031169504aa07c0N.dll
Resource
win10v2004-20240802-en
General
-
Target
1e41f709b8d0864da031169504aa07c0N.dll
-
Size
635KB
-
MD5
1e41f709b8d0864da031169504aa07c0
-
SHA1
0116de7e7e6b8d4825cdcfbf1728792fee04c990
-
SHA256
116e0e34277faff3117d7408b32d293bedc0073b37bdd2441937d9bd750bf503
-
SHA512
2559f8c5d386d0686c2402b3037018690f94de8dc0a6aa3df7a4878b683ad64b4d423d96289be1dcdca8e80e056c3fd9c7e6c2bb95ef5559d6fae816be0db242
-
SSDEEP
12288:ndnyCdjIr3XiY3BiPb96IzmcAK/pyiChBN8G6supYMXJidmSHiZCsjV36n73mgE:nUPOVsupYM5ZS+Cr72
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3600 wrote to memory of 1644 3600 rundll32.exe 81 PID 3600 wrote to memory of 1644 3600 rundll32.exe 81 PID 3600 wrote to memory of 1644 3600 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1e41f709b8d0864da031169504aa07c0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1e41f709b8d0864da031169504aa07c0N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1644
-