Analysis
-
max time kernel
100s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 08:02
Static task
static1
Behavioral task
behavioral1
Sample
9c1cb1f9db1e879fb4043b840993ebf0N.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
9c1cb1f9db1e879fb4043b840993ebf0N.dll
Resource
win10v2004-20240802-en
General
-
Target
9c1cb1f9db1e879fb4043b840993ebf0N.dll
-
Size
6KB
-
MD5
9c1cb1f9db1e879fb4043b840993ebf0
-
SHA1
cc85714ea814c81b14d31cb49787a3433bfc1879
-
SHA256
4a698d6ec30f72ab967871bcf290e14bf0ff9ea1a96b156d7acbe6d965b0c927
-
SHA512
c12c9e3787df72f02255634ff010d338d9c1518b47dab9b12ffd77ea8ae6292e7860f5000435a6b0c56fe81a9af36886d8bf47c951dfda856c12b60c19e916ff
-
SSDEEP
96:hy859x0P8Ma/Cg4TOwwav0Duz9HUaLM/h6NRIcHh8K7+pkYhQze:F5oL62s2HUaQKpBzSWGQze
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4076 wrote to memory of 3676 4076 rundll32.exe 84 PID 4076 wrote to memory of 3676 4076 rundll32.exe 84 PID 4076 wrote to memory of 3676 4076 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9c1cb1f9db1e879fb4043b840993ebf0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9c1cb1f9db1e879fb4043b840993ebf0N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3676
-