Analysis
-
max time kernel
133s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 02:52
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
eb9a81588626f2fb5002198dc83caabf947885d15cfb2ef183aed6d4fee2f55d.dll
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
General
-
Target
eb9a81588626f2fb5002198dc83caabf947885d15cfb2ef183aed6d4fee2f55d.dll
-
Size
716KB
-
MD5
8caf53074b3bb64e78a28aeb2b1f16f0
-
SHA1
5299e78a6c53b9df021ffd23a85d1cacbe0d82e6
-
SHA256
eb9a81588626f2fb5002198dc83caabf947885d15cfb2ef183aed6d4fee2f55d
-
SHA512
21fc85313dbae98be2409a1190e9d1e07a2b228dee3143a2182fa10719322e1abd91cedd8c646f95385d052ad39cb0beb32d58317f00ed27d2a450cde54090cc
-
SSDEEP
6144:o6C5AXbMn7UI1FoV2gwTBlrIckPJYYYYYYYYYYYYH:o6RI1Fo/wT3cJYYYYYYYYYYYYH
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3932 wrote to memory of 3568 3932 rundll32.exe 84 PID 3932 wrote to memory of 3568 3932 rundll32.exe 84 PID 3932 wrote to memory of 3568 3932 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eb9a81588626f2fb5002198dc83caabf947885d15cfb2ef183aed6d4fee2f55d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eb9a81588626f2fb5002198dc83caabf947885d15cfb2ef183aed6d4fee2f55d.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3568
-