Analysis
-
max time kernel
133s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-08-2024 15:44
Behavioral task
behavioral1
Sample
11b87c0ad7c06050d3af24d73aed0b01c1839264243cb29b992b06ded124d9ea.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
11b87c0ad7c06050d3af24d73aed0b01c1839264243cb29b992b06ded124d9ea.dll
Resource
win11-20240802-en
General
-
Target
11b87c0ad7c06050d3af24d73aed0b01c1839264243cb29b992b06ded124d9ea.dll
-
Size
127KB
-
MD5
babfda6375b07d76f6a46af11bdc3787
-
SHA1
0cd82432e87efc88a1bb17c29231f6d09f4110e9
-
SHA256
11b87c0ad7c06050d3af24d73aed0b01c1839264243cb29b992b06ded124d9ea
-
SHA512
a1df0624a4302f04586c22efcbcedbb77a69edd55f3298c3ef9b880ed16ce1f6d728be2246a11c295b76d412c06e3a6ede9d69db0e3ddcf463b9f42174512d5a
-
SSDEEP
3072:FDrG/eLj+t+YpqUjWouVPkrH3/U9acw62xm4+5j:5aeL6g2jfuVPqxA5j
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4060 wrote to memory of 4488 4060 rundll32.exe 84 PID 4060 wrote to memory of 4488 4060 rundll32.exe 84 PID 4060 wrote to memory of 4488 4060 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\11b87c0ad7c06050d3af24d73aed0b01c1839264243cb29b992b06ded124d9ea.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\11b87c0ad7c06050d3af24d73aed0b01c1839264243cb29b992b06ded124d9ea.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4488
-