Analysis
-
max time kernel
100s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 11:05
Static task
static1
Behavioral task
behavioral1
Sample
a4c997ac608c5f596145d6425e262e70N.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a4c997ac608c5f596145d6425e262e70N.dll
Resource
win10v2004-20240802-en
General
-
Target
a4c997ac608c5f596145d6425e262e70N.dll
-
Size
6KB
-
MD5
a4c997ac608c5f596145d6425e262e70
-
SHA1
39d6b2a8d5af8bc2c7a391432f47588f9e0df977
-
SHA256
6830449dd7fdb9e05c26f5d03ea7e210858ed80114fec0fbdfc7486dff240894
-
SHA512
3789176e58c069f86e4e96ee8fac7bf5c259bcf69fc0c2ee70534828dbbca8fd5dd19456ba98292bf2ef64b45a05e8490541a5ea936651c0e35f8088da107016
-
SSDEEP
96:nEY2RrF1eqwi4dFze5823osy/7BQz5iRFYt22ia7RCiJEH/DTSvX:EHRh1eppdFzw4seBQ9iTb2iaNTJEfU
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4792 wrote to memory of 2432 4792 rundll32.exe 87 PID 4792 wrote to memory of 2432 4792 rundll32.exe 87 PID 4792 wrote to memory of 2432 4792 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a4c997ac608c5f596145d6425e262e70N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a4c997ac608c5f596145d6425e262e70N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2432
-