Analysis
-
max time kernel
115s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:19
Static task
static1
Behavioral task
behavioral1
Sample
a0f5d9dd0d8276815880c8391886dcccdfa9513abd1727f05de011a81118e3b4N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a0f5d9dd0d8276815880c8391886dcccdfa9513abd1727f05de011a81118e3b4N.dll
Resource
win10v2004-20240802-en
General
-
Target
a0f5d9dd0d8276815880c8391886dcccdfa9513abd1727f05de011a81118e3b4N.dll
-
Size
7KB
-
MD5
28efd03cc1764c2d3e281ab7db280e70
-
SHA1
de00c820707c31c17b2b69b23eea584314dd83e0
-
SHA256
a0f5d9dd0d8276815880c8391886dcccdfa9513abd1727f05de011a81118e3b4
-
SHA512
4897ecd9704d998050fcc13bd1bc3d4b7f040bbfabc47d4b3554250cd49db5b12795e1e6d087a39f6e0e204ed40d0acad51916ed00edd59105cabaf1184e41dd
-
SSDEEP
96:DixZjmjtjd8jPjcZGR5TIc2Jm6tOXIdnNZx9X8s+dl+pJ68Z2pQSkXM:unSR6bgY1eLRNZXMs6+768Z2OSG
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1496 wrote to memory of 4156 1496 rundll32.exe 89 PID 1496 wrote to memory of 4156 1496 rundll32.exe 89 PID 1496 wrote to memory of 4156 1496 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a0f5d9dd0d8276815880c8391886dcccdfa9513abd1727f05de011a81118e3b4N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a0f5d9dd0d8276815880c8391886dcccdfa9513abd1727f05de011a81118e3b4N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4128,i,16316361669272684588,6171287487746154806,262144 --variations-seed-version --mojo-platform-channel-handle=4076 /prefetch:81⤵PID:1568