Analysis
-
max time kernel
94s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 14:42
Static task
static1
Behavioral task
behavioral1
Sample
c1f645e4ac8b79197bec34c3b79b0c8c94feb8aecc40814423e25d63d001a04fN.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c1f645e4ac8b79197bec34c3b79b0c8c94feb8aecc40814423e25d63d001a04fN.dll
Resource
win10v2004-20240802-en
General
-
Target
c1f645e4ac8b79197bec34c3b79b0c8c94feb8aecc40814423e25d63d001a04fN.dll
-
Size
6KB
-
MD5
4b0170cb9dc2f1531de82ce89b00e830
-
SHA1
2e4f76511c1a950907225d376e5b234e9f031a7f
-
SHA256
c1f645e4ac8b79197bec34c3b79b0c8c94feb8aecc40814423e25d63d001a04f
-
SHA512
0be5408eb5421d51caf641eab59324ace314e97e56e21e1bd3590f05d4490dc761a2974303380eddaee16e64c8b223b9955b500f42450ae8308e18674069910a
-
SSDEEP
96:hy859x0P8MaT5FpEduRVqexSnqmhO6t/ygvi7:F5oLE5Fp4u7Uqmlygvi
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3320 wrote to memory of 5004 3320 rundll32.exe 83 PID 3320 wrote to memory of 5004 3320 rundll32.exe 83 PID 3320 wrote to memory of 5004 3320 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c1f645e4ac8b79197bec34c3b79b0c8c94feb8aecc40814423e25d63d001a04fN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c1f645e4ac8b79197bec34c3b79b0c8c94feb8aecc40814423e25d63d001a04fN.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:5004
-