Analysis
-
max time kernel
95s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 15:31
Static task
static1
Behavioral task
behavioral1
Sample
1111e4eeeefef657472f8cd894b9981cd3858bcec647a6345e0ab245acd9cdcd.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1111e4eeeefef657472f8cd894b9981cd3858bcec647a6345e0ab245acd9cdcd.dll
Resource
win10v2004-20240802-en
General
-
Target
1111e4eeeefef657472f8cd894b9981cd3858bcec647a6345e0ab245acd9cdcd.dll
-
Size
396KB
-
MD5
fa34187856d2fb0ef15ed64aea144cbf
-
SHA1
20a2433e2a1f95f22211c08a72369e37425baee0
-
SHA256
1111e4eeeefef657472f8cd894b9981cd3858bcec647a6345e0ab245acd9cdcd
-
SHA512
1e407825bbd4400564008b50212166cce60e6dc09b52eda503faef7ca28851af75b5b18c653b33094a630c8abf7fb64556a228193cad7fd76dad4632cb908e72
-
SSDEEP
1536:1//nvVU8SxcTVgmdqxve5x/qDcL7I9xkw3HvztX1m:J/n2BgcQV6wGdLtX1m
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3376 wrote to memory of 4568 3376 rundll32.exe 83 PID 3376 wrote to memory of 4568 3376 rundll32.exe 83 PID 3376 wrote to memory of 4568 3376 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1111e4eeeefef657472f8cd894b9981cd3858bcec647a6345e0ab245acd9cdcd.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1111e4eeeefef657472f8cd894b9981cd3858bcec647a6345e0ab245acd9cdcd.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4568
-