Analysis
-
max time kernel
95s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 05:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
50e0bc30270a5f0adc19e58403b7bb80N.dll
Resource
win7-20240903-en
2 signatures
120 seconds
Behavioral task
behavioral2
Sample
50e0bc30270a5f0adc19e58403b7bb80N.dll
Resource
win10v2004-20240802-en
2 signatures
120 seconds
General
-
Target
50e0bc30270a5f0adc19e58403b7bb80N.dll
-
Size
3KB
-
MD5
50e0bc30270a5f0adc19e58403b7bb80
-
SHA1
16bacecd136fddfb09d5ff3dd9dab5e3e829e533
-
SHA256
3eb8ac84b410a65c36057acc7c8e1dd35d519300cf03774c8e03060f7dc71ff9
-
SHA512
c1551018d9eabc811a90fd12f1d67e6a913d76f717106a726443852c0e8643c7b43f1ad5313f22cccde1eeb36dd49db82684c5cffb08ad8a90d84ff765602856
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5116 wrote to memory of 2584 5116 rundll32.exe 83 PID 5116 wrote to memory of 2584 5116 rundll32.exe 83 PID 5116 wrote to memory of 2584 5116 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\50e0bc30270a5f0adc19e58403b7bb80N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\50e0bc30270a5f0adc19e58403b7bb80N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2584
-