Analysis
-
max time kernel
102s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2024 09:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e142f76a111ea452583b68b050affc70N.dll
Resource
win7-20240704-en
windows7-x64
2 signatures
120 seconds
Behavioral task
behavioral2
Sample
e142f76a111ea452583b68b050affc70N.dll
Resource
win10v2004-20240802-en
windows10-2004-x64
2 signatures
120 seconds
General
-
Target
e142f76a111ea452583b68b050affc70N.dll
-
Size
3KB
-
MD5
e142f76a111ea452583b68b050affc70
-
SHA1
74fbe3ae6410f4ce5b126cd5fa394451b831d815
-
SHA256
27dc2f20d51fe4bb05cf1c98668694101b7eff2212d006b91c579a6d6e56c6fb
-
SHA512
b468203c0aa8025631bb53d32f0bb965e527db9f68a0381218cac8c36b21d2e5088e450f55f1075431c8594c628d4a80dd97f3f3d8aa9c2458a1f3a599014e34
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2408 wrote to memory of 1072 2408 rundll32.exe 84 PID 2408 wrote to memory of 1072 2408 rundll32.exe 84 PID 2408 wrote to memory of 1072 2408 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e142f76a111ea452583b68b050affc70N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e142f76a111ea452583b68b050affc70N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1072
-