Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 01:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d30fde9ac91268e28110869aa5a6a330N.dll
Resource
win7-20240708-en
windows7-x64
3 signatures
120 seconds
General
-
Target
d30fde9ac91268e28110869aa5a6a330N.dll
-
Size
1.0MB
-
MD5
d30fde9ac91268e28110869aa5a6a330
-
SHA1
51e79259226cbd6310ccc1dfafb69f43f1a398db
-
SHA256
d0586543f6fc5062d08b2aa687f9cd631d5850a5ffb391a229dc33d0f0c4f1ae
-
SHA512
747071248bb55511ee7485c671ac3e56b877f10eededb3b629e8528d062ffdae88cadd13ab9e9176c7c9258f6c175911662ba2ab15021d325fc92cad0adb7ebd
-
SSDEEP
6144:o6C5AXbMn7UI1FoV2gwTBlrIckPJYYYYYYYYYYYYi:o6RI1Fo/wT3cJYYYYYYYYYYYYi
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1728 wrote to memory of 4512 1728 rundll32.exe 83 PID 1728 wrote to memory of 4512 1728 rundll32.exe 83 PID 1728 wrote to memory of 4512 1728 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d30fde9ac91268e28110869aa5a6a330N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d30fde9ac91268e28110869aa5a6a330N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4512
-