Analysis
-
max time kernel
90s -
max time network
91s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 14:12
Static task
static1
Behavioral task
behavioral1
Sample
3cc447df382382b3650c2f02306e95c4089dcc865ecf514fca0b7a2b6db54783N.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3cc447df382382b3650c2f02306e95c4089dcc865ecf514fca0b7a2b6db54783N.dll
Resource
win10v2004-20240802-en
General
-
Target
3cc447df382382b3650c2f02306e95c4089dcc865ecf514fca0b7a2b6db54783N.dll
-
Size
4KB
-
MD5
1840febc6d01e384b56d927e1fe52080
-
SHA1
3c7f17372bafd43bc181604d4cd05d57a72cc74f
-
SHA256
3cc447df382382b3650c2f02306e95c4089dcc865ecf514fca0b7a2b6db54783
-
SHA512
dfd12b45d17bd0d63fa40c14e4605599defd666f2c9c8cecc7fd1ef1c152ec6150398a1a5672998b700426ddcead1268a906d85dd6afc8d2b95592381173e265
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4848 wrote to memory of 3124 4848 rundll32.exe 85 PID 4848 wrote to memory of 3124 4848 rundll32.exe 85 PID 4848 wrote to memory of 3124 4848 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3cc447df382382b3650c2f02306e95c4089dcc865ecf514fca0b7a2b6db54783N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3cc447df382382b3650c2f02306e95c4089dcc865ecf514fca0b7a2b6db54783N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3124
-