Analysis
-
max time kernel
79s -
max time network
80s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-08-2024 05:50
Static task
static1
Behavioral task
behavioral1
Sample
5b5add20a313b13bd7cdfe08fb013e30N.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5b5add20a313b13bd7cdfe08fb013e30N.dll
Resource
win10v2004-20240802-en
General
-
Target
5b5add20a313b13bd7cdfe08fb013e30N.dll
-
Size
5KB
-
MD5
5b5add20a313b13bd7cdfe08fb013e30
-
SHA1
90cfa24ab6a922fb880a5237793d52517cba1bcc
-
SHA256
e6c06af810a82105405ac1d9fc7c256998513b9eef296b5df702acaf95d2400a
-
SHA512
7d05ea04bd6f28956346484e58fd9ed1fe24ed5e2c8a808fd31b173aa1dec8dfcbfba2eed18344f398b141e249d4d061c70977910d3729c939f6b385afe8b02e
-
SSDEEP
48:SWkO0IoyTnXz+ihZjokJ8v1zn0UJMa2Bi3LJj0/8GRsKtgJDj+AovJA/X:ZJTnXzvokJQ0mDNjo89GAcGf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4540 wrote to memory of 532 4540 rundll32.exe 84 PID 4540 wrote to memory of 532 4540 rundll32.exe 84 PID 4540 wrote to memory of 532 4540 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5b5add20a313b13bd7cdfe08fb013e30N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5b5add20a313b13bd7cdfe08fb013e30N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:532
-