Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-08-2024 16:20
Static task
static1
Behavioral task
behavioral1
Sample
cddd7b66b6ad5974ebbf52223cf03f90N.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
cddd7b66b6ad5974ebbf52223cf03f90N.dll
Resource
win10v2004-20240802-en
General
-
Target
cddd7b66b6ad5974ebbf52223cf03f90N.dll
-
Size
335KB
-
MD5
cddd7b66b6ad5974ebbf52223cf03f90
-
SHA1
38842f99177a223b3f9b9ccee5bfce2cc527cf05
-
SHA256
6285042f5c5f6ac3cb3f1f145f24ac9cb89914a3f6c5291afaf81785af001e71
-
SHA512
5941cbad0e31cef58258a23f8af5177ee92e4238a2b5aa6483c11619f1b98da00e270f2dfcf2214a1574c255d773119b80928ac45594b05a22902c49b951411c
-
SSDEEP
3072:Il+uUjVFRTN1hCXn0iwMwHyaXnTcRJC7VsB8d+Z1gTEyRbSMlncLZOYCmoAgihpZ:LVGwMwp7Vw8RClEihpPqEv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1864 wrote to memory of 404 1864 rundll32.exe 83 PID 1864 wrote to memory of 404 1864 rundll32.exe 83 PID 1864 wrote to memory of 404 1864 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cddd7b66b6ad5974ebbf52223cf03f90N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cddd7b66b6ad5974ebbf52223cf03f90N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:404
-