Analysis
-
max time kernel
93s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 08:10
Static task
static1
Behavioral task
behavioral1
Sample
413d84c17f05f2982dde64d97ab57430N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
413d84c17f05f2982dde64d97ab57430N.dll
Resource
win10v2004-20240802-en
General
-
Target
413d84c17f05f2982dde64d97ab57430N.dll
-
Size
158KB
-
MD5
413d84c17f05f2982dde64d97ab57430
-
SHA1
b0f1d2713040cf4339a6634e005cc265beceadc7
-
SHA256
d8e4ef16224345ee9194318b60844b10d267ac484d28c57cdcc7b0908983fa91
-
SHA512
e216e02f4c99189196f0092dfa09eb514d572a9beb5a776ac2501f2daf295b22e8404a14e17373273a1901d579d201ddd2010c7e4e659cc52a295b6bebb6f7f8
-
SSDEEP
3072:QfhfPm9N0QlS7CvXVr3rFqjhUawmt7iDYPJLQwhS5dKzoHrZ:OZm8krP55q134yLQbJHr
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2916 wrote to memory of 3560 2916 rundll32.exe 83 PID 2916 wrote to memory of 3560 2916 rundll32.exe 83 PID 2916 wrote to memory of 3560 2916 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\413d84c17f05f2982dde64d97ab57430N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\413d84c17f05f2982dde64d97ab57430N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3560
-