Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-08-2024 01:58
Static task
static1
Behavioral task
behavioral1
Sample
1d6cbfccbca460851cfe72c87b73d480N.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
1d6cbfccbca460851cfe72c87b73d480N.dll
Resource
win10v2004-20240802-en
General
-
Target
1d6cbfccbca460851cfe72c87b73d480N.dll
-
Size
6KB
-
MD5
1d6cbfccbca460851cfe72c87b73d480
-
SHA1
1ecfedf7769ea9b0985981c37449862c1511532d
-
SHA256
39f6697a5f072749b1688cfbc850e909f16670844e55c12cda913a8f22b53aec
-
SHA512
cdd5a86581b25c3e5013a3c337314871875106cb9006981a7a616997edb956752deb4cc0840f69406ee402e6c37af6dd259576c143e705fc20702fb4ad299dd2
-
SSDEEP
48:CCy86+Wet9Q/iooHeiefhe+/lSMYEqkjvG2ve0BGhWvBgvChGshuulJ7SwGkHkf/:hy859x0P8Ma4LjLyxOYP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 220 wrote to memory of 3732 220 rundll32.exe 93 PID 220 wrote to memory of 3732 220 rundll32.exe 93 PID 220 wrote to memory of 3732 220 rundll32.exe 93
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1d6cbfccbca460851cfe72c87b73d480N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1d6cbfccbca460851cfe72c87b73d480N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3996,i,1729213506309163284,12809566808978835441,262144 --variations-seed-version --mojo-platform-channel-handle=3860 /prefetch:81⤵PID:3464