Analysis
-
max time kernel
108s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16/08/2024, 21:08
Behavioral task
behavioral1
Sample
d3edf30593fad5242fa8444773c1e870N.dll
Resource
win7-20240704-en
3 signatures
120 seconds
General
-
Target
d3edf30593fad5242fa8444773c1e870N.dll
-
Size
374KB
-
MD5
d3edf30593fad5242fa8444773c1e870
-
SHA1
01eb36d12814389b7d88c62e82542663ea09f3bb
-
SHA256
92b3bbaa03b08a08dd6f49d4d677fdb67a3619bd4dc844907efd8803526a5f18
-
SHA512
5e3263e4d813ac4deabdcf4975007e6dc551064455929dcb092735178fc05c2afddc64d61602ecf39e4c281a22fe108816822c2d23cb167a95b70e4a248e3775
-
SSDEEP
6144:OUfZQobUuniGEPk6VVMP06JjdFms5ofJX70PFYOWyKO7:OGQeZnB4k6oM6Jjd9ohQttw
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3416-0-0x0000000010000000-0x00000000100F2000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4484 wrote to memory of 3416 4484 rundll32.exe 84 PID 4484 wrote to memory of 3416 4484 rundll32.exe 84 PID 4484 wrote to memory of 3416 4484 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d3edf30593fad5242fa8444773c1e870N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d3edf30593fad5242fa8444773c1e870N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3416
-