Analysis
-
max time kernel
104s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2024, 00:04
Static task
static1
Behavioral task
behavioral1
Sample
bc4d2a603fb2afe0795e723320fd9ea0N.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bc4d2a603fb2afe0795e723320fd9ea0N.dll
Resource
win10v2004-20240802-en
General
-
Target
bc4d2a603fb2afe0795e723320fd9ea0N.dll
-
Size
5KB
-
MD5
bc4d2a603fb2afe0795e723320fd9ea0
-
SHA1
e53a0800693e6a22f413585924631ce382c36e30
-
SHA256
f457aa100323c1faf8ff722177834ffa65434cc58f11b3b970e2ca999e9ddc30
-
SHA512
e0a91582a2e8fe7b849e3a7532e7e77f5255e6dcd8a166e6f7225b352bf3e76dbe3f016bc3c78e01b428078ed6f5a7f2b33d90ec056a4c5ec94333ef5642d4af
-
SSDEEP
48:CCy86+Wet9Q/iooHeiefhe+/lSMYEqh0AXPqBxEAEylh6h/SVYBezMJUq2caAlm9:hy859x0P8Mah0AyBKjIIJSV+s7qB+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4752 wrote to memory of 2568 4752 rundll32.exe 84 PID 4752 wrote to memory of 2568 4752 rundll32.exe 84 PID 4752 wrote to memory of 2568 4752 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bc4d2a603fb2afe0795e723320fd9ea0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bc4d2a603fb2afe0795e723320fd9ea0N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2568
-