Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 03:57
Static task
static1
Behavioral task
behavioral1
Sample
9aacffe08f5bf96a8e96214021094a80N.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9aacffe08f5bf96a8e96214021094a80N.dll
Resource
win10v2004-20240802-en
General
-
Target
9aacffe08f5bf96a8e96214021094a80N.dll
-
Size
1.5MB
-
MD5
9aacffe08f5bf96a8e96214021094a80
-
SHA1
65d2569e8dafc1cf990c8c2d4605078980630847
-
SHA256
9019cb133061aa1cbc767b73f22d01bae3d2241978557cea4889fc484e9719f0
-
SHA512
a40219316089558b3d8c38c4ec3220e593818df0feef9ef505662baf818bd6f2c16d081f8b40c10142e22e500d4cf8b63a58b386cb3f23b321eda12af911df07
-
SSDEEP
6144:YFjeFW6wiDwJ8pFAhp7Lyf/8c/28AH7O8zu/Ab2:YFj36NpFAXW8cOs
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3660 wrote to memory of 3536 3660 rundll32.exe rundll32.exe PID 3660 wrote to memory of 3536 3660 rundll32.exe rundll32.exe PID 3660 wrote to memory of 3536 3660 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9aacffe08f5bf96a8e96214021094a80N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9aacffe08f5bf96a8e96214021094a80N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4416,i,11391966286255097843,10588851088187498028,262144 --variations-seed-version --mojo-platform-channel-handle=4352 /prefetch:81⤵PID:2340