Analysis
-
max time kernel
135s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 03:50
Static task
static1
Behavioral task
behavioral1
Sample
e4e3a96d509016b35bf9f7011e8789ea7e8730c3ee806f65d5f50a56a5477e46.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e4e3a96d509016b35bf9f7011e8789ea7e8730c3ee806f65d5f50a56a5477e46.dll
Resource
win10v2004-20240802-en
General
-
Target
e4e3a96d509016b35bf9f7011e8789ea7e8730c3ee806f65d5f50a56a5477e46.dll
-
Size
6KB
-
MD5
52f9c50700df8ab9b4446850d5e97983
-
SHA1
824e47d6d463314bc76b9e6277a7c9868272a40b
-
SHA256
e4e3a96d509016b35bf9f7011e8789ea7e8730c3ee806f65d5f50a56a5477e46
-
SHA512
bbf70be28a5816405b5632a44bc243b9b0095236a623b15471c946b384ea90e71a9a2d982371167190a644059dcfa621a4450327639b6909b572238806118fed
-
SSDEEP
48:63mll5YVOa9VUX1iwbQWu0hB+BDq9J5SH:VDa9VUX9bQWBB+FqX5SH
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4768 wrote to memory of 952 4768 rundll32.exe 85 PID 4768 wrote to memory of 952 4768 rundll32.exe 85 PID 4768 wrote to memory of 952 4768 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e4e3a96d509016b35bf9f7011e8789ea7e8730c3ee806f65d5f50a56a5477e46.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e4e3a96d509016b35bf9f7011e8789ea7e8730c3ee806f65d5f50a56a5477e46.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:952
-