Analysis
-
max time kernel
135s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2024, 20:05
Static task
static1
Behavioral task
behavioral1
Sample
261d044fa6e334a35af2d021d10bc4a9208b608b73dc4111f50446243162d507.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
261d044fa6e334a35af2d021d10bc4a9208b608b73dc4111f50446243162d507.dll
Resource
win10v2004-20240802-en
General
-
Target
261d044fa6e334a35af2d021d10bc4a9208b608b73dc4111f50446243162d507.dll
-
Size
6KB
-
MD5
0bf2e341a1036708112ab56735a8a752
-
SHA1
879e0248e0bbab9870326433e5f4c06f3599c96a
-
SHA256
261d044fa6e334a35af2d021d10bc4a9208b608b73dc4111f50446243162d507
-
SHA512
715515d222cf34ef10b9e6725aaa4a8225212176409237096a017b93ae140a1fad0df070f891f0129a7ca9dc3f86cabcda48582fcbd4a43dffaa16e02a20b87e
-
SSDEEP
96:hyZxm/jmjhjvj3jcZGV4FWkYqEMWiD9SRksBDdjKvOKhNN4ZFVQjfjGLx9r3jOVH:2M/SdjbgYKyBiDYRkSgT4iOxFoq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3652 wrote to memory of 3432 3652 rundll32.exe 84 PID 3652 wrote to memory of 3432 3652 rundll32.exe 84 PID 3652 wrote to memory of 3432 3652 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\261d044fa6e334a35af2d021d10bc4a9208b608b73dc4111f50446243162d507.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\261d044fa6e334a35af2d021d10bc4a9208b608b73dc4111f50446243162d507.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3432
-