Analysis
-
max time kernel
104s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2024 07:06
Static task
static1
Behavioral task
behavioral1
Sample
bc2aa1884e6d9c9eb654194bdd22e940N.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bc2aa1884e6d9c9eb654194bdd22e940N.dll
Resource
win10v2004-20240802-en
General
-
Target
bc2aa1884e6d9c9eb654194bdd22e940N.dll
-
Size
4KB
-
MD5
bc2aa1884e6d9c9eb654194bdd22e940
-
SHA1
c412926b2fae34b0b7b9fa41f5a64e9456001a67
-
SHA256
dbc23b9b90e16170d6a9bf71895ff0525854b88f78fe86e901f895df7cd8a332
-
SHA512
33622bba3b6d09ca7d3282eb7e754f96a1f1a50adcb4465ebe1f62d1e51900169ad5c92282f78a6c0c7cf1edad8fb10719716535b0bafc394f93423befa9f272
-
SSDEEP
48:SWkO0IoyTnXz+ihZjokklPQ5LStY6Sitno0r8J3y/bdN6gRbnry:ZJTnXzvokklPQ5/6ztQJ30XE
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1096 1724 rundll32.exe 86 PID 1724 wrote to memory of 1096 1724 rundll32.exe 86 PID 1724 wrote to memory of 1096 1724 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bc2aa1884e6d9c9eb654194bdd22e940N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bc2aa1884e6d9c9eb654194bdd22e940N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1096
-