Analysis
-
max time kernel
93s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/08/2024, 06:57
Static task
static1
Behavioral task
behavioral1
Sample
613013e47d88fb716fa68362be7c23d0N.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
613013e47d88fb716fa68362be7c23d0N.dll
Resource
win10v2004-20240802-en
General
-
Target
613013e47d88fb716fa68362be7c23d0N.dll
-
Size
6KB
-
MD5
613013e47d88fb716fa68362be7c23d0
-
SHA1
c3faf9775d5d7cf84652634b9d0422ae7b024254
-
SHA256
b8d176b8e13bb746c4fa58f9cb25751ce3773786a441ad77e057955b8dcf6d2c
-
SHA512
859e79a53a49a820985ed90d35dfc24af5a076e74c5ff6ddea0edfd5ee425fad02e4441a869f73a980f6709f16d8f4fc6d42004cdf4468585dcea94100b51af2
-
SSDEEP
48:6WQV5YVOqtV0H1pw9ygYVUG0oOB+BDq9J5SC:8qtV0HAr4/OB+FqX5SC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4340 wrote to memory of 744 4340 rundll32.exe 83 PID 4340 wrote to memory of 744 4340 rundll32.exe 83 PID 4340 wrote to memory of 744 4340 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\613013e47d88fb716fa68362be7c23d0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\613013e47d88fb716fa68362be7c23d0N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:744
-