Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 01:02
Static task
static1
Behavioral task
behavioral1
Sample
11a349c509fbfe4a4f3e88542ff526804ca2a74161491fb88b4323103b9a50fbN.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
11a349c509fbfe4a4f3e88542ff526804ca2a74161491fb88b4323103b9a50fbN.dll
Resource
win10v2004-20240802-en
General
-
Target
11a349c509fbfe4a4f3e88542ff526804ca2a74161491fb88b4323103b9a50fbN.dll
-
Size
5KB
-
MD5
3a51cae5b2dc827369ecaa26bd7803c0
-
SHA1
6f04f0527956bfc62ce94fe72c04d20852a21876
-
SHA256
11a349c509fbfe4a4f3e88542ff526804ca2a74161491fb88b4323103b9a50fb
-
SHA512
6e29d658b40259eb8b97cfc7772ae28e118d7cf1618d72390d509bcb69830c340cece65dfa3637ee9c4888f1e3ac2b973c6d85a7a416b22f65801c47892b4847
-
SSDEEP
96:nEY2RrF1eqwi4oZIQcj09rUJoaGi8VAmS:EHRh1eppoO10UoXi8V
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3824 wrote to memory of 2792 3824 rundll32.exe 82 PID 3824 wrote to memory of 2792 3824 rundll32.exe 82 PID 3824 wrote to memory of 2792 3824 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\11a349c509fbfe4a4f3e88542ff526804ca2a74161491fb88b4323103b9a50fbN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\11a349c509fbfe4a4f3e88542ff526804ca2a74161491fb88b4323103b9a50fbN.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2792
-