Analysis
-
max time kernel
93s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-08-2024 00:07
Static task
static1
Behavioral task
behavioral1
Sample
8ab6e200bd6973258a3d022b4273f9f132c21e312c544fb8f1d26abbf36abc8d.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8ab6e200bd6973258a3d022b4273f9f132c21e312c544fb8f1d26abbf36abc8d.dll
Resource
win10v2004-20240802-en
General
-
Target
8ab6e200bd6973258a3d022b4273f9f132c21e312c544fb8f1d26abbf36abc8d.dll
-
Size
6KB
-
MD5
32eb29de8a2849e7c36b9a8218d87aab
-
SHA1
44610918f3eae36741c342c376d0a5f282a520bc
-
SHA256
8ab6e200bd6973258a3d022b4273f9f132c21e312c544fb8f1d26abbf36abc8d
-
SHA512
2b1b6136de42a7dc1da057e98b9c2894f0432d2c9640a7b25b756aefba4b5966cf8c49313e9cf3fea14dce3b6e375262866ad9ffac5915c6af00a62f9aa5361d
-
SSDEEP
48:CCy86+Wet9Q/iooHeiefhe+/lSMYEqrAhlk2ip7:hy859x0P8Marilk2A
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3400 wrote to memory of 956 3400 rundll32.exe 81 PID 3400 wrote to memory of 956 3400 rundll32.exe 81 PID 3400 wrote to memory of 956 3400 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8ab6e200bd6973258a3d022b4273f9f132c21e312c544fb8f1d26abbf36abc8d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8ab6e200bd6973258a3d022b4273f9f132c21e312c544fb8f1d26abbf36abc8d.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:956
-