Analysis
-
max time kernel
95s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 19:18
Static task
static1
Behavioral task
behavioral1
Sample
8d2f1e616387dd00240577e4b900c8c0N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8d2f1e616387dd00240577e4b900c8c0N.dll
Resource
win10v2004-20240802-en
General
-
Target
8d2f1e616387dd00240577e4b900c8c0N.dll
-
Size
6KB
-
MD5
8d2f1e616387dd00240577e4b900c8c0
-
SHA1
ceb390be214d0340becb2601d89677ceca48a979
-
SHA256
af1c33cb3331a6ca07121894a7078b4e44a7e11cdfd6753894424ee91eb35a44
-
SHA512
0587b812ece2e367d67bab8f7db4f4b9db58edbc6fa216135f9718cfa92f842243a3d991c7788a4f042f6fad0578f93a711c028c6960e69b32e7fc2df79953e1
-
SSDEEP
48:6AA35YVOQDV8FszwydlAYsLFV3G0lB+BDq9J5S2:0QDV8FscMjsLFV3dB+FqX5S2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3124 wrote to memory of 4716 3124 rundll32.exe 83 PID 3124 wrote to memory of 4716 3124 rundll32.exe 83 PID 3124 wrote to memory of 4716 3124 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8d2f1e616387dd00240577e4b900c8c0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8d2f1e616387dd00240577e4b900c8c0N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4716
-