Analysis
-
max time kernel
101s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2024, 14:48
Static task
static1
Behavioral task
behavioral1
Sample
9debeb853ab5e0f5c22c27bba2577550N.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
9debeb853ab5e0f5c22c27bba2577550N.dll
Resource
win10v2004-20240802-en
General
-
Target
9debeb853ab5e0f5c22c27bba2577550N.dll
-
Size
7KB
-
MD5
9debeb853ab5e0f5c22c27bba2577550
-
SHA1
1eebd17676eb4f3a568e0127ed73fd93b8f0afc4
-
SHA256
1f515119f19140178848795922412b048bf212afd9c38ebd304cf8346a542d63
-
SHA512
52ac35f8903450da9e6ec61608add625f7bdb3dd7865cc7cf1ad46365ee6c2897cf696a1fdee012a51046358386e1e6efc0ecb116fa34531ea72f08cf3ab1845
-
SSDEEP
96:6Kh3utCJNQCZQvXO20C5RyYLB+cwfUzC1GWCj0KMRZQDLHel2mIXT6pDYW:R3ugNs+ZC5RyYVAtCmRZoEyD6pUW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1828 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2324 wrote to memory of 1828 2324 rundll32.exe 84 PID 2324 wrote to memory of 1828 2324 rundll32.exe 84 PID 2324 wrote to memory of 1828 2324 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9debeb853ab5e0f5c22c27bba2577550N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9debeb853ab5e0f5c22c27bba2577550N.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1828
-