Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/08/2024, 16:29
Static task
static1
Behavioral task
behavioral1
Sample
af23ff249712e603f6e89db5e41a12b0N.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
af23ff249712e603f6e89db5e41a12b0N.dll
Resource
win10v2004-20240802-en
General
-
Target
af23ff249712e603f6e89db5e41a12b0N.dll
-
Size
6KB
-
MD5
af23ff249712e603f6e89db5e41a12b0
-
SHA1
4cd2fd1005460f59cad73469c1aa30992d032e10
-
SHA256
de1241c5a74138938457f83b8b05b2c529fe3fc58d66afaec4d2d070b27df1bd
-
SHA512
fca607abd4593fc5579eab3ea39f1e259e572973b653a146da3cf19b24187bde0dcdc2d7741fcbbfb63dfddccd1e86a5e4faad1550bdf359ab18078b119700c5
-
SSDEEP
48:CCy86+Wet9Q/iooHeiefhe+/lSMYEqdyomymVMy+Lz7xYGziAfXB0u9PfnCT9VIm:hy859x0P8Madyr/VoeAfx0MfsVhOsNz
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3536 wrote to memory of 4520 3536 rundll32.exe 83 PID 3536 wrote to memory of 4520 3536 rundll32.exe 83 PID 3536 wrote to memory of 4520 3536 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\af23ff249712e603f6e89db5e41a12b0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\af23ff249712e603f6e89db5e41a12b0N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4520
-