Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:33
Static task
static1
Behavioral task
behavioral1
Sample
b06350a4f7698792737659bb74181eaeb4bea7f8277626e4694fd4123f2ca80eN.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b06350a4f7698792737659bb74181eaeb4bea7f8277626e4694fd4123f2ca80eN.dll
Resource
win10v2004-20240802-en
General
-
Target
b06350a4f7698792737659bb74181eaeb4bea7f8277626e4694fd4123f2ca80eN.dll
-
Size
3KB
-
MD5
01f9bf9956bc76963b0836cd99cd8c00
-
SHA1
59b53044fc7818e99c8cf54df1819de138b92f53
-
SHA256
b06350a4f7698792737659bb74181eaeb4bea7f8277626e4694fd4123f2ca80e
-
SHA512
3d63c3b1f55f9a53045a00ed6023c1659398fec6d82f26bef3d6bb239390f7c3f26ff731690b631fa617700787f9b96be1f3e7850a8f0797c6635cdfc049234c
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4000 wrote to memory of 3944 4000 rundll32.exe 82 PID 4000 wrote to memory of 3944 4000 rundll32.exe 82 PID 4000 wrote to memory of 3944 4000 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b06350a4f7698792737659bb74181eaeb4bea7f8277626e4694fd4123f2ca80eN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b06350a4f7698792737659bb74181eaeb4bea7f8277626e4694fd4123f2ca80eN.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3944
-