Analysis
-
max time kernel
91s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-08-2024 20:37
Static task
static1
Behavioral task
behavioral1
Sample
39e6579310105875831a6caccb0a73aa45fa1cd3b9833109f44dd923ae8f7a57.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
39e6579310105875831a6caccb0a73aa45fa1cd3b9833109f44dd923ae8f7a57.dll
Resource
win10v2004-20240802-en
General
-
Target
39e6579310105875831a6caccb0a73aa45fa1cd3b9833109f44dd923ae8f7a57.dll
-
Size
1.5MB
-
MD5
bb8003727d821324fd3756e0b9b851a4
-
SHA1
32af55790e19f8d6e1e7743b3ca5bd4935dc5a2e
-
SHA256
39e6579310105875831a6caccb0a73aa45fa1cd3b9833109f44dd923ae8f7a57
-
SHA512
a9ea5fa38157c2cc3b65419f0bab210ffcf6f6e0e8668150f6146d723ef4ed0fb4fdea3d1d60c76846392a9b552a9815035e7d8e163f72c564ffc757f5b23936
-
SSDEEP
24576:HeOE0l8McZiULDA8T5lbmGs1UJAK5PAtNg+w:io+ien5FLs14H5PAzw
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4892 wrote to memory of 3940 4892 rundll32.exe 80 PID 4892 wrote to memory of 3940 4892 rundll32.exe 80 PID 4892 wrote to memory of 3940 4892 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\39e6579310105875831a6caccb0a73aa45fa1cd3b9833109f44dd923ae8f7a57.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\39e6579310105875831a6caccb0a73aa45fa1cd3b9833109f44dd923ae8f7a57.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3940
-