Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-08-2024 01:25
Behavioral task
behavioral1
Sample
fac06e78df65d037c38a2df8d6939b069e8a231107b5e86dec241eb2b3b3920f.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fac06e78df65d037c38a2df8d6939b069e8a231107b5e86dec241eb2b3b3920f.dll
Resource
win10v2004-20240802-en
General
-
Target
fac06e78df65d037c38a2df8d6939b069e8a231107b5e86dec241eb2b3b3920f.dll
-
Size
104KB
-
MD5
35d97fe4def32490e580b328c39beaa7
-
SHA1
9c522e94b84c9f71f10588aacff535eaf7370b25
-
SHA256
fac06e78df65d037c38a2df8d6939b069e8a231107b5e86dec241eb2b3b3920f
-
SHA512
6cf5c6326577f5ab47ec52e262fea8fc5e2203ffc0807cd537b2fe20375d3691a722288ab9dbd1e8ca26701d123644dac498439152b7e9cc463d82e1275fee16
-
SSDEEP
1536:7NYgj9qG3W5jXp8m6TIzX2INMq55u/b//xHU4HMtQ:OGWjVFnYhU4HMtQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 836 wrote to memory of 1072 836 rundll32.exe 84 PID 836 wrote to memory of 1072 836 rundll32.exe 84 PID 836 wrote to memory of 1072 836 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fac06e78df65d037c38a2df8d6939b069e8a231107b5e86dec241eb2b3b3920f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fac06e78df65d037c38a2df8d6939b069e8a231107b5e86dec241eb2b3b3920f.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1072
-