Analysis
-
max time kernel
93s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 20:42
Static task
static1
Behavioral task
behavioral1
Sample
df0ce76f8a52b8c79b83398b6d5caea0N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df0ce76f8a52b8c79b83398b6d5caea0N.dll
Resource
win10v2004-20240802-en
General
-
Target
df0ce76f8a52b8c79b83398b6d5caea0N.dll
-
Size
340KB
-
MD5
df0ce76f8a52b8c79b83398b6d5caea0
-
SHA1
19f04ab3b24004bd11f7166c8f4b8067716dff1c
-
SHA256
e603c7c9063a9249eba7da909c09dbb142de66a55618dc479bfcf5673f02f124
-
SHA512
085baf2d31e32a659e26cc1f1c02fc403821ffb8b97cf1db30e8de65fec2057207ad768dd70d0900ec2933a367de470503e1bba028da57cb012749ef8f3a8f23
-
SSDEEP
3072:wvA1p08RqEQAIVEd2gG/vNlo0JFx/pANyCm0PQEKR/JnXHWP:w206xWgGxLxWN40PDKR/JnX2P
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 412 wrote to memory of 1868 412 rundll32.exe 83 PID 412 wrote to memory of 1868 412 rundll32.exe 83 PID 412 wrote to memory of 1868 412 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\df0ce76f8a52b8c79b83398b6d5caea0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\df0ce76f8a52b8c79b83398b6d5caea0N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1868
-