Analysis
-
max time kernel
91s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 05:47
Static task
static1
Behavioral task
behavioral1
Sample
86c6803d86d6835902b96c40297c7ef0N.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
86c6803d86d6835902b96c40297c7ef0N.dll
Resource
win10v2004-20240802-en
General
-
Target
86c6803d86d6835902b96c40297c7ef0N.dll
-
Size
5KB
-
MD5
86c6803d86d6835902b96c40297c7ef0
-
SHA1
d6cfe63cabe3faa85226452d7dab4ff37759b395
-
SHA256
8c01aa20dd6f83aed7d00cb0f4c658debb62e863a005cac9d625e0e7e1a8113c
-
SHA512
7202afe4430eb525a5c32d82243bff05021b5fc56b7d1dea4bf0ff644fd795e35803ca22eecf64edfa426df0e430e6c7bfa38961771e4b22635585ae70531258
-
SSDEEP
48:CCy86+Wet9Q/iooHeiefhe+/lSMYEq8d+gJeKyQCYjroPB1gKTLkPMsB9oWR6hg/:hy859x0P8Ma8d+gkYhjJPMqp5uKt4/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5036 wrote to memory of 2316 5036 rundll32.exe 85 PID 5036 wrote to memory of 2316 5036 rundll32.exe 85 PID 5036 wrote to memory of 2316 5036 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\86c6803d86d6835902b96c40297c7ef0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\86c6803d86d6835902b96c40297c7ef0N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2316
-