Analysis
-
max time kernel
114s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2024, 13:17
Static task
static1
Behavioral task
behavioral1
Sample
c6afe3bd2e0e3164965bd229589f8470N.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c6afe3bd2e0e3164965bd229589f8470N.dll
Resource
win10v2004-20240802-en
General
-
Target
c6afe3bd2e0e3164965bd229589f8470N.dll
-
Size
198KB
-
MD5
c6afe3bd2e0e3164965bd229589f8470
-
SHA1
c3a22e224b682381169387e608e86c1512029b6b
-
SHA256
860100568d884f670d194416bf85f9f416dd3697b06d78ce11749fb9a8271383
-
SHA512
74f1851725107227a1d19a3ac2c8f10b8d7cb71460a5db86855275fcd1c6bdfc14b6fc7d9a3d341bed1651fb472b183e7c902f1c88d1068ff5c287b78190725d
-
SSDEEP
3072:5xpIHiL2150WJuzkOKcr5IVlrRqDd2iptlCVE8wM8LG0udQIIJNpH/y/6:5xpIHiU50WJuzkOKciQVptlCRi3IIJN1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3328 wrote to memory of 1164 3328 rundll32.exe 91 PID 3328 wrote to memory of 1164 3328 rundll32.exe 91 PID 3328 wrote to memory of 1164 3328 rundll32.exe 91
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c6afe3bd2e0e3164965bd229589f8470N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c6afe3bd2e0e3164965bd229589f8470N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4188,i,8293235976513689021,7261015831736501466,262144 --variations-seed-version --mojo-platform-channel-handle=1904 /prefetch:81⤵PID:548