Analysis
-
max time kernel
98s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 14:01
Static task
static1
Behavioral task
behavioral1
Sample
688395f2dc0ca8295f57fdcf91bfa670N.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
688395f2dc0ca8295f57fdcf91bfa670N.dll
Resource
win10v2004-20240802-en
General
-
Target
688395f2dc0ca8295f57fdcf91bfa670N.dll
-
Size
6KB
-
MD5
688395f2dc0ca8295f57fdcf91bfa670
-
SHA1
ed931932696d0e6468b1528c5c3fcfc319e23ea1
-
SHA256
36c01db104fccf824e34f364dbfd3d3fd9eccf054260987047349e9e31ff037a
-
SHA512
a910e30ddd7ca973cf5788fd3ac7012c78417f3c65caf816ec78f207c1b08f6566dfbc406f2ca824a8ca41dbe07bad35ce30d0888066b581c60a3b3e82508f17
-
SSDEEP
48:CCy86+Wet9Q/iooHeiefhe+/lSMYEqLS8Pg0WysOUu68jdccS1KHS9SVSDkFnaKb:hy859x0P8MaVgefPT1kGd/v
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3076 wrote to memory of 2732 3076 rundll32.exe 87 PID 3076 wrote to memory of 2732 3076 rundll32.exe 87 PID 3076 wrote to memory of 2732 3076 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\688395f2dc0ca8295f57fdcf91bfa670N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\688395f2dc0ca8295f57fdcf91bfa670N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2732
-