Analysis
-
max time kernel
91s -
max time network
92s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-09-2024 17:23
Static task
static1
Behavioral task
behavioral1
Sample
67aa06f338355cf7b4579f5f266817b0N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
67aa06f338355cf7b4579f5f266817b0N.dll
Resource
win10v2004-20240802-en
General
-
Target
67aa06f338355cf7b4579f5f266817b0N.dll
-
Size
6KB
-
MD5
67aa06f338355cf7b4579f5f266817b0
-
SHA1
552cd5e1d602d9b4009b6171a84ef06d326c7fc2
-
SHA256
452bd09a75ceed1919e475dcc467ea2f2967e40805c25e2124d1de98884cd0e7
-
SHA512
e419e59fefe011bf2764848856d9c8c97248d3b5e9539394a2b484f260c67f0eca5c7fc014cdb47e6b23589f1bd277105f40e829654d42958a53b1b063dde636
-
SSDEEP
48:6EQt5YVOSVVEPy+wEMmqiHNpU10mB+BDq9J5SV3DY:CSVVEPozmB70B+FqX5S1D
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3624 wrote to memory of 2388 3624 rundll32.exe 86 PID 3624 wrote to memory of 2388 3624 rundll32.exe 86 PID 3624 wrote to memory of 2388 3624 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\67aa06f338355cf7b4579f5f266817b0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\67aa06f338355cf7b4579f5f266817b0N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2388
-