Analysis
-
max time kernel
92s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 07:04
Behavioral task
behavioral1
Sample
32066fd095c16998561a9bdc8401680b9ded333c28e3269a45dff6bb0401f3c1.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
32066fd095c16998561a9bdc8401680b9ded333c28e3269a45dff6bb0401f3c1.dll
Resource
win10v2004-20240910-en
General
-
Target
32066fd095c16998561a9bdc8401680b9ded333c28e3269a45dff6bb0401f3c1.dll
-
Size
3.8MB
-
MD5
9f11b706c787f6eefa18ad8d9cdb88bb
-
SHA1
f5701aabba035b10600f767d6b65003b89b003d6
-
SHA256
32066fd095c16998561a9bdc8401680b9ded333c28e3269a45dff6bb0401f3c1
-
SHA512
8e77062db9594ea85f3dfb696b640e2e3fc1b43fd9f64cfb63d6d17c3ebc0f6b6f62667a22cde5774de51cf8ff4cee90c3963eaf69b23b461c0fb5dc2a6c92bf
-
SSDEEP
98304:+uh0t3pfKLvqDW6k2ZGYrYLf2xzwynNBo6gU+lkKdd:R0t3pf6D9UGAzxsyN66W
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4544 wrote to memory of 1560 4544 rundll32.exe 83 PID 4544 wrote to memory of 1560 4544 rundll32.exe 83 PID 4544 wrote to memory of 1560 4544 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\32066fd095c16998561a9bdc8401680b9ded333c28e3269a45dff6bb0401f3c1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\32066fd095c16998561a9bdc8401680b9ded333c28e3269a45dff6bb0401f3c1.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1560
-