Analysis
-
max time kernel
101s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 11:44
Static task
static1
Behavioral task
behavioral1
Sample
7591ea5511cc281de781e2e885c856f0N.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7591ea5511cc281de781e2e885c856f0N.dll
Resource
win10v2004-20240802-en
General
-
Target
7591ea5511cc281de781e2e885c856f0N.dll
-
Size
6KB
-
MD5
7591ea5511cc281de781e2e885c856f0
-
SHA1
73d8afe846e62840b44041b5b1ad65ddff841e81
-
SHA256
51d6a0c7861722af397d510f4b1cf770416ec2c0908712fa8a7d016cd1312be3
-
SHA512
00ec796a1d3fa87120f475e424622754404232266006f5fdb21567224d0fd3a182681dce1891c5c7681fb1e7f6a5b66edc9b34f4b1f7e87f1d94f03df1d6104c
-
SSDEEP
96:DixZjmjtjd8jPjcZGR5TIfz48DmbtnAWQoVDAcewSCuft1zkQ:unSR6bgYJbtnAv4hI3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2820 wrote to memory of 5000 2820 rundll32.exe 85 PID 2820 wrote to memory of 5000 2820 rundll32.exe 85 PID 2820 wrote to memory of 5000 2820 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7591ea5511cc281de781e2e885c856f0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7591ea5511cc281de781e2e885c856f0N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:5000
-