Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 03:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e8e77a06f36f5d73276e0ec3e524ddc0c3aaab6163444b29de5cf6ae159159a9.dll
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
General
-
Target
e8e77a06f36f5d73276e0ec3e524ddc0c3aaab6163444b29de5cf6ae159159a9.dll
-
Size
503KB
-
MD5
f6d76de5156f141d516c74a20ed26859
-
SHA1
a5bd0da8fd9ac1afa6ff51c4496eebbf144dfe01
-
SHA256
e8e77a06f36f5d73276e0ec3e524ddc0c3aaab6163444b29de5cf6ae159159a9
-
SHA512
8a34ffb272db70e7981e653803a68287c1a854b33248efa4b6590da7c3c0a96d229a7066f70b1b64e5dcc598b02a694658bd3b12b8f03b1b825828432fb926ac
-
SSDEEP
3072:o6pU5Y1DXnbMn7Uzkop61/dAzV2O3XwTBftrm2YedGf3QKZDp:o6C5AXbMn7UI1FoV2gwTBlrIckPr
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3648 wrote to memory of 4056 3648 rundll32.exe 82 PID 3648 wrote to memory of 4056 3648 rundll32.exe 82 PID 3648 wrote to memory of 4056 3648 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e8e77a06f36f5d73276e0ec3e524ddc0c3aaab6163444b29de5cf6ae159159a9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e8e77a06f36f5d73276e0ec3e524ddc0c3aaab6163444b29de5cf6ae159159a9.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4056
-