Analysis
-
max time kernel
97s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 05:04
Static task
static1
Behavioral task
behavioral1
Sample
acbe83c027d51f0b3ba67c9daab07c338f46580abf21e0d497e31cd9929ff206N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
acbe83c027d51f0b3ba67c9daab07c338f46580abf21e0d497e31cd9929ff206N.dll
Resource
win10v2004-20240802-en
General
-
Target
acbe83c027d51f0b3ba67c9daab07c338f46580abf21e0d497e31cd9929ff206N.dll
-
Size
4.6MB
-
MD5
eaae95adb1f75e37ac01b8f0aa0c88d0
-
SHA1
20713961ed50be8d515686d44a6ed30a526601cd
-
SHA256
acbe83c027d51f0b3ba67c9daab07c338f46580abf21e0d497e31cd9929ff206
-
SHA512
8650eeae240d5f7c13065910b4bbcdaaa8c4f98c9ef4e97e5e970c3ed4e26f4c4449c3e045d404a52a9c4702eae82b23769e0efa8c78d56f3c04cfcd8e5e9da1
-
SSDEEP
98304:2u6vOjpN0H3zgdXgK3c8iBxFs2iqkyyMtFHzkYhAxcikKql3WG:5Bpm2R3ZEtpz5ATkK635
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3472 rundll32.exe 3472 rundll32.exe 3472 rundll32.exe 3472 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3660 wrote to memory of 3472 3660 rundll32.exe 82 PID 3660 wrote to memory of 3472 3660 rundll32.exe 82 PID 3660 wrote to memory of 3472 3660 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\acbe83c027d51f0b3ba67c9daab07c338f46580abf21e0d497e31cd9929ff206N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\acbe83c027d51f0b3ba67c9daab07c338f46580abf21e0d497e31cd9929ff206N.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3472
-