Analysis
-
max time kernel
93s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/09/2024, 06:34
Static task
static1
Behavioral task
behavioral1
Sample
93bfcde56f053b15811b46792bb208d0N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
93bfcde56f053b15811b46792bb208d0N.dll
Resource
win10v2004-20240802-en
General
-
Target
93bfcde56f053b15811b46792bb208d0N.dll
-
Size
7KB
-
MD5
93bfcde56f053b15811b46792bb208d0
-
SHA1
d6647c5beaf6a21fe1ff9e63d8c4755bc94abff3
-
SHA256
1ae7b73172fd1ffc19c4af63dfd1d32fc735919b81d10ec7e4ebba2bcbebc558
-
SHA512
6ec562160d407aefdd910e6d2e05b5b20d4f468d4a94716cf2d55fe877b1baad137f0db0eb0ec9ab1315a163cf0d819ecfef4c167c409b67e4b5284ceec5a17b
-
SSDEEP
96:VGEETrMLH5t0LGzITYQMzSSoga1yfi+QFwyeLDS2e+OWh+V7j61S:efMZOY3WPSLQF0SkOWYV3eS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1608 wrote to memory of 3000 1608 rundll32.exe 83 PID 1608 wrote to memory of 3000 1608 rundll32.exe 83 PID 1608 wrote to memory of 3000 1608 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\93bfcde56f053b15811b46792bb208d0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\93bfcde56f053b15811b46792bb208d0N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3000
-