Analysis
-
max time kernel
114s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 17:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
759082c0631e1ba2078a3b85501565a0N.dll
Resource
win7-20240708-en
windows7-x64
3 signatures
120 seconds
General
-
Target
759082c0631e1ba2078a3b85501565a0N.dll
-
Size
1.1MB
-
MD5
759082c0631e1ba2078a3b85501565a0
-
SHA1
86dfa5c7a5d5e3e4257d36ec0a925c7944fda024
-
SHA256
fbc0fe4b72f946aa65e886a445205ed9f553e32b658bb91020e42f83573f7d30
-
SHA512
e6c373581b4e50fa0cc48a36cb38ffd05b7a8f7210e2c16185d7e7a1a60da405b9d4e18bc8cbaed61948b1b0ae14685ccc18a2c797970bf05eaa35828cb30677
-
SSDEEP
12288:jDgN6MoIwT3qOOOOOOOOOOOOOOOOOOOOOOU:jTtT3qOOOOOOOOOOOOOOOOOOOOOOU
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5084 wrote to memory of 3804 5084 rundll32.exe 83 PID 5084 wrote to memory of 3804 5084 rundll32.exe 83 PID 5084 wrote to memory of 3804 5084 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\759082c0631e1ba2078a3b85501565a0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\759082c0631e1ba2078a3b85501565a0N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3804
-