Analysis
-
max time kernel
96s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 05:58
Static task
static1
Behavioral task
behavioral1
Sample
4a410c233c1234ff470bc98c457d37c0N.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4a410c233c1234ff470bc98c457d37c0N.dll
Resource
win10v2004-20240802-en
General
-
Target
4a410c233c1234ff470bc98c457d37c0N.dll
-
Size
74KB
-
MD5
4a410c233c1234ff470bc98c457d37c0
-
SHA1
b3d0e0f611410cbc48c44a220877767fbd810083
-
SHA256
145e79351358d73f6b4a4ebaa760f1482ad07e83c411930863d51bd3e72fdb2e
-
SHA512
cc886d9f06869d87484af56c1535cb289cabc9753c74b3f56002ea7dcbc355cd3a86c12b4ed700c3190e4991139154a99d17a9a8f19a71512a9ccde48705951a
-
SSDEEP
1536:IokvLFF/n1FcSPZuYw601UQR27YZf4dq3L:I9vBFzcStkUQR27YZf403L
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1464 wrote to memory of 1260 1464 rundll32.exe 84 PID 1464 wrote to memory of 1260 1464 rundll32.exe 84 PID 1464 wrote to memory of 1260 1464 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a410c233c1234ff470bc98c457d37c0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a410c233c1234ff470bc98c457d37c0N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1260
-