Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/09/2024, 00:07
Static task
static1
Behavioral task
behavioral1
Sample
3bfee4f9faefa107c20e1ef79a5e4500N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3bfee4f9faefa107c20e1ef79a5e4500N.dll
Resource
win10v2004-20240802-en
General
-
Target
3bfee4f9faefa107c20e1ef79a5e4500N.dll
-
Size
208KB
-
MD5
3bfee4f9faefa107c20e1ef79a5e4500
-
SHA1
45fda95ef2df251eb68c3506bdef8b3d351b1e53
-
SHA256
53f8e94ca37bfc350a1468dd70870f3ca43de64a1feafb8c9ac93a47820dc0da
-
SHA512
1a94f6dfa3eb318db52337f975b78191f3c74f8deaad2175639e84e569341bb0676958030bb8ed8ae7822b35b79fd5d45f470bc9a7936308041d58cff8b2c85d
-
SSDEEP
3072:+p9DObzRCoAuFo/iHUbB6aW6TBQomu0m+VitdnsA6VmHOjwVIXO:y63RCoAuW60bB/TG8winnP6uOjweX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1632 wrote to memory of 3368 1632 rundll32.exe 83 PID 1632 wrote to memory of 3368 1632 rundll32.exe 83 PID 1632 wrote to memory of 3368 1632 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3bfee4f9faefa107c20e1ef79a5e4500N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3bfee4f9faefa107c20e1ef79a5e4500N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3368
-