Analysis
-
max time kernel
101s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 01:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b4f6272f1203b17771b77a7689d9d4c0N.dll
Resource
win7-20240704-en
2 signatures
120 seconds
Behavioral task
behavioral2
Sample
b4f6272f1203b17771b77a7689d9d4c0N.dll
Resource
win10v2004-20240802-en
2 signatures
120 seconds
General
-
Target
b4f6272f1203b17771b77a7689d9d4c0N.dll
-
Size
3KB
-
MD5
b4f6272f1203b17771b77a7689d9d4c0
-
SHA1
29c742e06e0458aa875733f3da5ecab939ee1c1a
-
SHA256
442c796764b443053d0109ced3986e405e22e177c3796dd50b1e511eeb78b51e
-
SHA512
ffaa24bcccbc9f360ed0f3c4d0912cfc2022a888e33f6c341fc74c8e35040ec84a03d6384b3bbbf9fab2a3b1102dd6de1193962b379c73897048485523b86bee
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3932 wrote to memory of 3604 3932 rundll32.exe 84 PID 3932 wrote to memory of 3604 3932 rundll32.exe 84 PID 3932 wrote to memory of 3604 3932 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b4f6272f1203b17771b77a7689d9d4c0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b4f6272f1203b17771b77a7689d9d4c0N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3604
-