Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 04:01
Static task
static1
Behavioral task
behavioral1
Sample
bc618f0459eb3cf46a55e6154ae03360N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bc618f0459eb3cf46a55e6154ae03360N.dll
Resource
win10v2004-20240802-en
General
-
Target
bc618f0459eb3cf46a55e6154ae03360N.dll
-
Size
7KB
-
MD5
bc618f0459eb3cf46a55e6154ae03360
-
SHA1
7362263d5ad3f022bc2147ff8f69bd8b2e34dfdd
-
SHA256
7951e51bd6157722fb900805b3d7db8a8537175896aa31891b24e558a87e239b
-
SHA512
5a7067476470115486cf4994f94ad6d792afb12c6fd394ff5a0e20f3896cb974c1c2a8dd573722ea6fb05fc32f844aa9597b4f3c7c5cff6f410fb6d6c7edc3ad
-
SSDEEP
96:wb4VHccYJUC/aFbz/j0OvaP2dd3cX5aXW:wUaJf/aFbP0Of2JaX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2344 3000 rundll32.exe 83 PID 3000 wrote to memory of 2344 3000 rundll32.exe 83 PID 3000 wrote to memory of 2344 3000 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bc618f0459eb3cf46a55e6154ae03360N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bc618f0459eb3cf46a55e6154ae03360N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2344
-