Analysis
-
max time kernel
92s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 15:44
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
04b9b6ec620c12c066ad844f72c59ba0N.dll
Resource
win7-20240704-en
2 signatures
120 seconds
Behavioral task
behavioral2
Sample
04b9b6ec620c12c066ad844f72c59ba0N.dll
Resource
win10v2004-20240802-en
2 signatures
120 seconds
General
-
Target
04b9b6ec620c12c066ad844f72c59ba0N.dll
-
Size
3KB
-
MD5
04b9b6ec620c12c066ad844f72c59ba0
-
SHA1
5d0b8cf86a1b866a019f443c4dd4fc9b457a8dc0
-
SHA256
7e5f634fb9d9dd15c3826266bb9d720631367d5243de54edca8aa0114d6c9e68
-
SHA512
2cc97749f96b524c9e5a4308b515298223280b837cba26db8c7b08af091241608624408c713221a75d7044ee8fc4693591630e529419f1c393e1c8a665863adc
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 708 wrote to memory of 684 708 rundll32.exe 86 PID 708 wrote to memory of 684 708 rundll32.exe 86 PID 708 wrote to memory of 684 708 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\04b9b6ec620c12c066ad844f72c59ba0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\04b9b6ec620c12c066ad844f72c59ba0N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:684
-