Analysis
-
max time kernel
95s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 07:50
Static task
static1
Behavioral task
behavioral1
Sample
3034dbdbbc55aa22712d3392a4e37140N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3034dbdbbc55aa22712d3392a4e37140N.dll
Resource
win10v2004-20240802-en
General
-
Target
3034dbdbbc55aa22712d3392a4e37140N.dll
-
Size
6KB
-
MD5
3034dbdbbc55aa22712d3392a4e37140
-
SHA1
fd72a3d8d1cecca66292e1ffa42da57d8821ffd8
-
SHA256
a4482dee63e9b3ed9a03068f634b7181671b0c42b348f0ec2c61dc4d5590dc94
-
SHA512
19230fe08517a8aa9487516bbffa463d804fc60cdc7b34df70f355930de7a752c2ea98fc4c02d496b146e2b4ffe85519c68691b0fd58dc5ef19945b851178b81
-
SSDEEP
48:CCy86+Wet9Q/iooHeiefhe+/lSMYEqw6v6ri756J6Zp7CONIm:hy859x0P8Maw2z756J6Zp7CB
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3692 wrote to memory of 664 3692 rundll32.exe 83 PID 3692 wrote to memory of 664 3692 rundll32.exe 83 PID 3692 wrote to memory of 664 3692 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3034dbdbbc55aa22712d3392a4e37140N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3034dbdbbc55aa22712d3392a4e37140N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:664
-