Analysis
-
max time kernel
94s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 06:33
Static task
static1
Behavioral task
behavioral1
Sample
ea80bf2ef483e8d347379b70f5f31780N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea80bf2ef483e8d347379b70f5f31780N.dll
Resource
win10v2004-20240802-en
General
-
Target
ea80bf2ef483e8d347379b70f5f31780N.dll
-
Size
5KB
-
MD5
ea80bf2ef483e8d347379b70f5f31780
-
SHA1
f1f7b86e50e6a484bccd87ead9037794048b3556
-
SHA256
01703205722575b9a2dbaff423b966f77a18fc781d38c6fdb876c811cccf28ce
-
SHA512
0d17628ccc5341c1445a2070c733f9968973a4747fb84c68776a6225e2abc45ac54e0e834063f9bde2848f24af6b9ee86e3675650c1131ffe24f644f1d6879a5
-
SSDEEP
96:DixZjmjtjd8jPjcZGR5TIzjU2OgNwna85XPXagWR:unSR6bgYIU2OgSd/KtR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4324 wrote to memory of 1472 4324 rundll32.exe 83 PID 4324 wrote to memory of 1472 4324 rundll32.exe 83 PID 4324 wrote to memory of 1472 4324 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea80bf2ef483e8d347379b70f5f31780N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea80bf2ef483e8d347379b70f5f31780N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1472
-