Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-08-2024 19:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
hostInfo.dll
Resource
win7-20240708-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
hostInfo.dll
Resource
win10v2004-20240802-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
hostInfo.dll
-
Size
184KB
-
MD5
e6a2cd60c92937c39555619ac9341160
-
SHA1
7fa6ceb673754f11b9b5320d52b21a1f6543b63c
-
SHA256
49e71d89bcd41eefafd4a4e85934a0a8d64f875950b5176a2792433f3a7e773b
-
SHA512
46b83025165c69516bbdf38a58410f1eef630242d8252e360d087fe88389db65bfa13a5118ede372a60a7c4c1c8eba67230013079024224a9e2ab6861282981f
-
SSDEEP
3072:pTD8qET4/oRX5GDjgdSutjlUzCsi6+lc79y0Wz1gC05xQvipex:pTD8qO4/sUgFtjlUuXn/07Yipex
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4276 wrote to memory of 3888 4276 rundll32.exe 84 PID 4276 wrote to memory of 3888 4276 rundll32.exe 84 PID 4276 wrote to memory of 3888 4276 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\hostInfo.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\hostInfo.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3888
-