Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 05:58
Static task
static1
Behavioral task
behavioral1
Sample
c6f7213a611240bc7315a17452a1cbf0N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c6f7213a611240bc7315a17452a1cbf0N.dll
Resource
win10v2004-20240802-en
General
-
Target
c6f7213a611240bc7315a17452a1cbf0N.dll
-
Size
147KB
-
MD5
c6f7213a611240bc7315a17452a1cbf0
-
SHA1
e11bd1705c988084ee67a9dd95fe0891c033615c
-
SHA256
b8546378e176346a210f6980108631da0d6e7d3befb2b226d171cf0e08f5dcef
-
SHA512
402ca1a22f97e4b7ba3c1f38d15a4d3d10b433dcdbc23a6198fbcfc4deccab34055e99de6bcf4c2f8fb43ff339dc0e3d3084823c2ebace0590fb23fbda2c1168
-
SSDEEP
3072:RBokbT3rA0j9Np72+q3NCVolHYeJaQT8lSeJkKsn4HOPDw9jj:RB7/A0Hp6JCVol4FQT8pJkle
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3468 wrote to memory of 4236 3468 rundll32.exe 83 PID 3468 wrote to memory of 4236 3468 rundll32.exe 83 PID 3468 wrote to memory of 4236 3468 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c6f7213a611240bc7315a17452a1cbf0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c6f7213a611240bc7315a17452a1cbf0N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4236
-