Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 07:44
Behavioral task
behavioral1
Sample
e8fbfde2237d49b43979d010a9c77190N.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e8fbfde2237d49b43979d010a9c77190N.dll
Resource
win10v2004-20240802-en
General
-
Target
e8fbfde2237d49b43979d010a9c77190N.dll
-
Size
63KB
-
MD5
e8fbfde2237d49b43979d010a9c77190
-
SHA1
d4685fe86634cd9e476dcaaf1219ca326d54ec4e
-
SHA256
4de5d042ac6d2354ba7e1808ded68c52c0086bed79f5960ebec7c5cd45b4fd89
-
SHA512
649c5658e01f54137aea9b213da18e1bb3d4f39461d799789970312078d4b4cbfa3528ce521bbc5c67b0b9275bab38f45ffdef71ce34dce5c4991bd30876e61b
-
SSDEEP
1536:V8dwRcxcMSEN+C0sFw0i7OCk8/lQDreuusfY4u0E:idB6MSENB0sFw0i7OC5/lQPeulY4u0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4416 wrote to memory of 5084 4416 rundll32.exe 83 PID 4416 wrote to memory of 5084 4416 rundll32.exe 83 PID 4416 wrote to memory of 5084 4416 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e8fbfde2237d49b43979d010a9c77190N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e8fbfde2237d49b43979d010a9c77190N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:5084
-