Analysis
-
max time kernel
93s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 17:20
Static task
static1
Behavioral task
behavioral1
Sample
cbd561a5f49aabd8a80c87bbfc7732d0N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cbd561a5f49aabd8a80c87bbfc7732d0N.dll
Resource
win10v2004-20240802-en
General
-
Target
cbd561a5f49aabd8a80c87bbfc7732d0N.dll
-
Size
346KB
-
MD5
cbd561a5f49aabd8a80c87bbfc7732d0
-
SHA1
f967915a649f92988ba692f6c0ca982500785468
-
SHA256
106b570c29bf0dc57a1a3b623faef88230cff2ae8d6290c3d7176833f87e6e8d
-
SHA512
27f3d2cc8aae15c5b7acd51740d22ad7980a327af2dcd187f3f8f828265e00e379643f2f756372185233906707ef3e8faf6b03bcc44032269434bc7d7e5491c9
-
SSDEEP
3072:l82jpiC2JG7HZb7XWQml/jz8A4diTE90Q6kF4CKAYRkcj:+2L7HN7Kl/jLA90QECrYRpj
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5096 wrote to memory of 4340 5096 rundll32.exe 83 PID 5096 wrote to memory of 4340 5096 rundll32.exe 83 PID 5096 wrote to memory of 4340 5096 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cbd561a5f49aabd8a80c87bbfc7732d0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cbd561a5f49aabd8a80c87bbfc7732d0N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4340
-