Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 04:59
Static task
static1
Behavioral task
behavioral1
Sample
ca6809e0a4a560a04adb6d14fd183ac3531909a3b9a63273ee952ce328e7260f.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ca6809e0a4a560a04adb6d14fd183ac3531909a3b9a63273ee952ce328e7260f.dll
Resource
win10v2004-20240730-en
General
-
Target
ca6809e0a4a560a04adb6d14fd183ac3531909a3b9a63273ee952ce328e7260f.dll
-
Size
164KB
-
MD5
58f7eb9bda0df35010a4deb815d31643
-
SHA1
8cd37c984da6c8e711122e6a7efdc17f189ac90d
-
SHA256
ca6809e0a4a560a04adb6d14fd183ac3531909a3b9a63273ee952ce328e7260f
-
SHA512
908d2a4936a2996cbc63c4d905caf1e1f47b83ab6bced18a0ed7c24f50df80793841e3136c96b8fc3a61070f2bfddeb58842486fa8080bfe1280e07139135c32
-
SSDEEP
3072:Yqg+CBkA4kaj3Kna79KzlcmDs2U0ezrcRqwGamSRLkPmEZpVarH/43ZJiObZ:Vgzk/j3KnpzlcmDs2U03RHzUbVaU3J9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3344 wrote to memory of 1848 3344 rundll32.exe 83 PID 3344 wrote to memory of 1848 3344 rundll32.exe 83 PID 3344 wrote to memory of 1848 3344 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ca6809e0a4a560a04adb6d14fd183ac3531909a3b9a63273ee952ce328e7260f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ca6809e0a4a560a04adb6d14fd183ac3531909a3b9a63273ee952ce328e7260f.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1848
-