Analysis
-
max time kernel
94s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 09:33
Static task
static1
Behavioral task
behavioral1
Sample
f66f6e1da20632f604a8744d4f1da920N.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f66f6e1da20632f604a8744d4f1da920N.dll
Resource
win10v2004-20240802-en
General
-
Target
f66f6e1da20632f604a8744d4f1da920N.dll
-
Size
6KB
-
MD5
f66f6e1da20632f604a8744d4f1da920
-
SHA1
4da8d7b9662e5ec30048efd70ad523a0f297b721
-
SHA256
904f4cb48c58f13a36daadc682a4da5e19105d77f4572c428d46e37fb83ef565
-
SHA512
b8d63db0b0ab934831a0f266ca984449fd3e9eeba9817801fa8761c9991d0e59be323035a745554e775615c6bcf92a34f113eee2663a064c685390ce9b370e39
-
SSDEEP
96:nEY2RrF1eqwi4wWUJmYQtao2G9LWnF2pJqh5TChvwCbBTMj:EHRh1eppjUJmYQ8yZy2TiQhV1I
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1128 wrote to memory of 2404 1128 rundll32.exe 83 PID 1128 wrote to memory of 2404 1128 rundll32.exe 83 PID 1128 wrote to memory of 2404 1128 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f66f6e1da20632f604a8744d4f1da920N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f66f6e1da20632f604a8744d4f1da920N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2404
-