Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 11:58
Static task
static1
Behavioral task
behavioral1
Sample
04043f05965522a15248e94810c2a2d0N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
04043f05965522a15248e94810c2a2d0N.dll
Resource
win10v2004-20240802-en
General
-
Target
04043f05965522a15248e94810c2a2d0N.dll
-
Size
110KB
-
MD5
04043f05965522a15248e94810c2a2d0
-
SHA1
653ef6d54fe3175a20251c88d2681db3a610adac
-
SHA256
3cfaadd30725d8e12f8ee9a3a71e8def452ce596fe3fd697c2898552d5504aa1
-
SHA512
973201032b30b7768ae3e63181bb500b57766e2777b24818cebbf11bad5b33bb8cf59f9f6e7d1c009cc8b9ed4923e36c62db6a4907b148e169a39cbef95d9ad8
-
SSDEEP
1536:Jr5ujdwlWtallJpj9qBqflxaqRGJRgC3z5l73T074X+Lu6iOT:NIvallJd9cClPR+RgC3z5RDXuLuDO
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3504 wrote to memory of 228 3504 rundll32.exe 83 PID 3504 wrote to memory of 228 3504 rundll32.exe 83 PID 3504 wrote to memory of 228 3504 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\04043f05965522a15248e94810c2a2d0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\04043f05965522a15248e94810c2a2d0N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:228
-