Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 04:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4ead33aed05c050d42814f1b34ca2c57f4e9892389f27a680e9b9cb4fe97970cN.dll
Resource
win7-20240708-en
windows7-x64
3 signatures
120 seconds
General
-
Target
4ead33aed05c050d42814f1b34ca2c57f4e9892389f27a680e9b9cb4fe97970cN.dll
-
Size
837KB
-
MD5
8bee3360c750101124737cadb0dbdd20
-
SHA1
7e66603bcf8cb481f6d4bef8658b0b0edd005d67
-
SHA256
4ead33aed05c050d42814f1b34ca2c57f4e9892389f27a680e9b9cb4fe97970c
-
SHA512
01ae05aa5b16ee9a7ff9781627e898913ad3c0919d353d2f0e0dd6ccf7fe13fdffab10329ce19c94010498b70705743490cc3797cb18d49e37c1084bac94df8a
-
SSDEEP
6144:jDgtfRQUHPw06MoV2nwTBlhm8zDgtfRQUHPw06MoV2nwTBlhm8D:jDgN6MoIwT3vDgN6MoIwT3X
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3216 wrote to memory of 2688 3216 rundll32.exe 82 PID 3216 wrote to memory of 2688 3216 rundll32.exe 82 PID 3216 wrote to memory of 2688 3216 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4ead33aed05c050d42814f1b34ca2c57f4e9892389f27a680e9b9cb4fe97970cN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4ead33aed05c050d42814f1b34ca2c57f4e9892389f27a680e9b9cb4fe97970cN.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2688
-