Analysis
-
max time kernel
101s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 10:08
Static task
static1
Behavioral task
behavioral1
Sample
9b1eeaf8630127856c24062ce0822800N.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
9b1eeaf8630127856c24062ce0822800N.dll
Resource
win10v2004-20240802-en
General
-
Target
9b1eeaf8630127856c24062ce0822800N.dll
-
Size
5KB
-
MD5
9b1eeaf8630127856c24062ce0822800
-
SHA1
627ad85852a89c03a9e6bf63df01575d4e8a0642
-
SHA256
ed7b365fba8cd7fb9d7f2a34b38358a8cafbd0b19e89cf54dc1e9a602b3d34e9
-
SHA512
808f2fd378f0d11653d9275d807ae55687980b1a13978e08b485b62e5161dec273aedf39aa8877999e103c20d23751e8c188371bece75d842fd44991c73f21bb
-
SSDEEP
96:hy859x0P8MaALOL3/iE7kPZGvfVhPIhNhY00:F5oL3ciE7ffzyNa00
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 908 wrote to memory of 1276 908 rundll32.exe 84 PID 908 wrote to memory of 1276 908 rundll32.exe 84 PID 908 wrote to memory of 1276 908 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9b1eeaf8630127856c24062ce0822800N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9b1eeaf8630127856c24062ce0822800N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1276
-