Analysis
-
max time kernel
95s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 17:43
Static task
static1
Behavioral task
behavioral1
Sample
0054a5a4b3af40cd9ee0a41304e3e610N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0054a5a4b3af40cd9ee0a41304e3e610N.dll
Resource
win10v2004-20240802-en
General
-
Target
0054a5a4b3af40cd9ee0a41304e3e610N.dll
-
Size
6KB
-
MD5
0054a5a4b3af40cd9ee0a41304e3e610
-
SHA1
e3b3f7a1b544cfbfc9e58dbc8a2e3672b7899b76
-
SHA256
28d231a2197112d0d7bc740d92e02ebc4c0df2acef4aa1d77cd7f8367428d7e2
-
SHA512
c0c27a5775c53529cfecb621dca9174aba7bc6f62ff6040e9d4782655691e73cf778301e9fc66bd22827f53069895a0f453526991ba4c622c963016fd71c1e61
-
SSDEEP
48:6DOdd5YVOiFVE/y/sqwokyJyi0HB+BDq9J5S9:piFVE/y6okJzB+FqX5S9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4236 wrote to memory of 2728 4236 rundll32.exe 83 PID 4236 wrote to memory of 2728 4236 rundll32.exe 83 PID 4236 wrote to memory of 2728 4236 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0054a5a4b3af40cd9ee0a41304e3e610N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0054a5a4b3af40cd9ee0a41304e3e610N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2728
-