Analysis
-
max time kernel
94s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 15:01
Static task
static1
Behavioral task
behavioral1
Sample
74d8e843cad48f01eafb276cab157e28fdf727765a7e24c553a1db53fbc0ab9b.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
74d8e843cad48f01eafb276cab157e28fdf727765a7e24c553a1db53fbc0ab9b.dll
Resource
win10v2004-20240802-en
General
-
Target
74d8e843cad48f01eafb276cab157e28fdf727765a7e24c553a1db53fbc0ab9b.dll
-
Size
151KB
-
MD5
553caeae517a0d0748d399f44c24caad
-
SHA1
69ee34f68d6d490bced12b683c0d86c4ce058806
-
SHA256
74d8e843cad48f01eafb276cab157e28fdf727765a7e24c553a1db53fbc0ab9b
-
SHA512
919ea136130767293ef52af4bff7b5346294107e7f1dca3ea3ec5560494f4c1da8ab261d399d4d734e8ec0c1c2cfa6969c67710d2a75ba30728f8977413bca6a
-
SSDEEP
3072:qZ2gml17oLyFuM8XLCe3dk9QQ8Hr4JjTgMkY8M:q4HFWXLT32ZV8M
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3956 wrote to memory of 540 3956 rundll32.exe 83 PID 3956 wrote to memory of 540 3956 rundll32.exe 83 PID 3956 wrote to memory of 540 3956 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\74d8e843cad48f01eafb276cab157e28fdf727765a7e24c553a1db53fbc0ab9b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\74d8e843cad48f01eafb276cab157e28fdf727765a7e24c553a1db53fbc0ab9b.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:540
-