Analysis
-
max time kernel
102s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-08-2024 13:41
Static task
static1
Behavioral task
behavioral1
Sample
0bc2d76cdba0dc00909ff6acaa434bc0N.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0bc2d76cdba0dc00909ff6acaa434bc0N.dll
Resource
win10v2004-20240802-en
General
-
Target
0bc2d76cdba0dc00909ff6acaa434bc0N.dll
-
Size
6KB
-
MD5
0bc2d76cdba0dc00909ff6acaa434bc0
-
SHA1
098b17551bf3ac7f6a083e1e4b9858c87308fcfe
-
SHA256
a796c03a6d7281009db0e783365396a2bd98b6a836a1b0728476fb21e50fa5d7
-
SHA512
e22954c9c188959a91a284dca392cfaad89fa4a21edff33a53a89c3a07cc24b44933aecc2d7c362425818b09a5cc7f8156d84a7332576369decfb4d94859e02d
-
SSDEEP
96:hy859x0P8Ma5K+nES3Qvj2S4jyen7/xlM8ydhe+ZA93/+sgjIzNMB1wJTcQi:F5oLcDnPQb2S4jyens85GtUzHTcQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4592 wrote to memory of 1372 4592 rundll32.exe 84 PID 4592 wrote to memory of 1372 4592 rundll32.exe 84 PID 4592 wrote to memory of 1372 4592 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0bc2d76cdba0dc00909ff6acaa434bc0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0bc2d76cdba0dc00909ff6acaa434bc0N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1372
-