Analysis
-
max time kernel
103s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 17:18
Static task
static1
Behavioral task
behavioral1
Sample
3187627c2731a9d11610cacd3cc77820N.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3187627c2731a9d11610cacd3cc77820N.dll
Resource
win10v2004-20240802-en
General
-
Target
3187627c2731a9d11610cacd3cc77820N.dll
-
Size
346KB
-
MD5
3187627c2731a9d11610cacd3cc77820
-
SHA1
7bd5543ea819929fef87dbbb72da628d723f822d
-
SHA256
1424e4aaa007b6b964cb88ab0467d6b7f67718a991eae5bef3d42c637595e121
-
SHA512
84ebe7d6a6d52a5bcc231455513fd088769a53ce07b769748f448f86b4127b35a77fad2d1cba188c21b85ae9c0dfc5c7585e80a7d4f98bd2422daac4213bffb3
-
SSDEEP
3072:d82jpiC2JG7HZb7XWQml/jz8A4diTE90Q6kF4CKAYRkcj:W2L7HN7Kl/jLA90QECrYRpj
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1468 wrote to memory of 3064 1468 rundll32.exe rundll32.exe PID 1468 wrote to memory of 3064 1468 rundll32.exe rundll32.exe PID 1468 wrote to memory of 3064 1468 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3187627c2731a9d11610cacd3cc77820N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3187627c2731a9d11610cacd3cc77820N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3064