Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2024, 05:10
Static task
static1
Behavioral task
behavioral1
Sample
df49859fb35a44af3f7c1a8d15f50eb6a3a650727ed465e9c672751e0a3fef58.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
df49859fb35a44af3f7c1a8d15f50eb6a3a650727ed465e9c672751e0a3fef58.dll
Resource
win10v2004-20240802-en
General
-
Target
df49859fb35a44af3f7c1a8d15f50eb6a3a650727ed465e9c672751e0a3fef58.dll
-
Size
3KB
-
MD5
640a1563d453562783b39908d1fca2e8
-
SHA1
6fcb0a4d4bb1da5677c90ea5e504e69d5b2f7a89
-
SHA256
df49859fb35a44af3f7c1a8d15f50eb6a3a650727ed465e9c672751e0a3fef58
-
SHA512
018f5bd4b4606f2d46a1dff7ee8b485eb44692d1bc5599271ca0015171a93e2a381139801fcfd3780aee8d0abd85555d4eea4fd96ffbd952ff13d080d4c8753b
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1544 wrote to memory of 3508 1544 rundll32.exe 83 PID 1544 wrote to memory of 3508 1544 rundll32.exe 83 PID 1544 wrote to memory of 3508 1544 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\df49859fb35a44af3f7c1a8d15f50eb6a3a650727ed465e9c672751e0a3fef58.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\df49859fb35a44af3f7c1a8d15f50eb6a3a650727ed465e9c672751e0a3fef58.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3508
-