Analysis
-
max time kernel
93s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 03:50
Static task
static1
Behavioral task
behavioral1
Sample
23a6f8a344fcff0f944e71490b70e420N.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
23a6f8a344fcff0f944e71490b70e420N.dll
Resource
win10v2004-20240802-en
General
-
Target
23a6f8a344fcff0f944e71490b70e420N.dll
-
Size
276KB
-
MD5
23a6f8a344fcff0f944e71490b70e420
-
SHA1
122c51bdc6eb660ef1dd6f31140e1d8900044e28
-
SHA256
532d021955ac09c89974d3fc60e3d02667acae34bc13d869bf7bd839f4859639
-
SHA512
3dc389b40cc8fb81f5601094470a39661cfde15a7951ee7547d04ab2fad6f3b6a97b68c6a99385619dec79c35757bdc0f6c789ee6545955a9aa88b1721c170be
-
SSDEEP
6144:/Iah6+KSpOmkme6cvjRiYJFQs9hhPuyvF1hJC2nk58V+Mo:/r6+KqOmkRlb8EB9hpuyvFBJnm8o
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2284 wrote to memory of 5060 2284 rundll32.exe 83 PID 2284 wrote to memory of 5060 2284 rundll32.exe 83 PID 2284 wrote to memory of 5060 2284 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\23a6f8a344fcff0f944e71490b70e420N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\23a6f8a344fcff0f944e71490b70e420N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:5060
-