Analysis
-
max time kernel
92s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/09/2024, 10:07
Static task
static1
Behavioral task
behavioral1
Sample
34f3a58366629e9d25317a81015c8e90N.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
34f3a58366629e9d25317a81015c8e90N.dll
Resource
win10v2004-20240802-en
General
-
Target
34f3a58366629e9d25317a81015c8e90N.dll
-
Size
6KB
-
MD5
34f3a58366629e9d25317a81015c8e90
-
SHA1
b72e9c0da23b83cf0f0b87f3eaa24bebf9e852c8
-
SHA256
85d2cd507bc8f8cc2d079a95d07611bd7c39bd7ae76fcddfed2b7f7560c333fe
-
SHA512
0fa5598c4813fc4bcf135b8754a9cd3aee431f9c22534cb14571e59a3c5cf363e19175004913fb7434329b3eb639ba436786759b5b1748f2023ceb22ce90e3c7
-
SSDEEP
96:nEY2RrF1eqwi4bBDo0p29y16Q5mV46E4Z:EHRh1epp9c0o9y1mV46E4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4880 wrote to memory of 2348 4880 rundll32.exe 83 PID 4880 wrote to memory of 2348 4880 rundll32.exe 83 PID 4880 wrote to memory of 2348 4880 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\34f3a58366629e9d25317a81015c8e90N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\34f3a58366629e9d25317a81015c8e90N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2348
-