Analysis
-
max time kernel
110s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 02:57
Behavioral task
behavioral1
Sample
9da71c732cc7b3c00c82387d4d4cf7f0N.dll
Resource
win7-20240729-en
windows7-x64
3 signatures
120 seconds
General
-
Target
9da71c732cc7b3c00c82387d4d4cf7f0N.dll
-
Size
785KB
-
MD5
9da71c732cc7b3c00c82387d4d4cf7f0
-
SHA1
20c9902f965868215536e8461eaad8979e12ca39
-
SHA256
8a6b219a6f86267d46e7fb496812187da2eb4679a608528f37760bb4c80628c6
-
SHA512
34b98af8b44cd40fa70823b1b07587580a49e631def22a0abb76298f255fb7eb45c87525327c8c3faff0bad8f42ee2b5fb889115dc58611c65d574f2020f2f1c
-
SSDEEP
12288:nveqONzG1rGoE/3OaiaUaKuHpTpeXbBJ2H3sIQ7ZSugNapaKtP+WlArIGLXiwX3:veqJGoEvOEKuH9pqB4XdaBPBArIGmwH
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/640-0-0x0000000000B20000-0x0000000000CEC000-memory.dmp vmprotect behavioral2/memory/640-1-0x0000000000B20000-0x0000000000CEC000-memory.dmp vmprotect behavioral2/memory/640-2-0x0000000000B20000-0x0000000000CEC000-memory.dmp vmprotect behavioral2/memory/640-3-0x0000000000B20000-0x0000000000CEC000-memory.dmp vmprotect -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1216 wrote to memory of 640 1216 rundll32.exe 83 PID 1216 wrote to memory of 640 1216 rundll32.exe 83 PID 1216 wrote to memory of 640 1216 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9da71c732cc7b3c00c82387d4d4cf7f0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9da71c732cc7b3c00c82387d4d4cf7f0N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:640
-