Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2024, 18:56
Behavioral task
behavioral1
Sample
af046b9f5e2380df8490253570334f14101606d96c958c953fef7307d415bd41N.dll
Resource
win7-20240903-en
3 signatures
120 seconds
General
-
Target
af046b9f5e2380df8490253570334f14101606d96c958c953fef7307d415bd41N.dll
-
Size
9KB
-
MD5
f00fc32c81f90678d230bb6a67243730
-
SHA1
15169d02443f46e1d87fe09ff95f213dbd25326f
-
SHA256
af046b9f5e2380df8490253570334f14101606d96c958c953fef7307d415bd41
-
SHA512
457aeda1e04296ecb0e0da4c3d958852138fd983501057cd56b8ed68ca0384f20e71dbd3c53a8ee0324aac497fa1e8cc98dcf3c5c30f4f447cb40453bfddc159
-
SSDEEP
192:nrvqijC1qAnS530R/JhrCncDNwxQ8VYNrRYTq3HyAdd8:LbjwqAnxJ9+SNwxzVU2q3r
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/916-0-0x0000000000400000-0x000000000040D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2184 wrote to memory of 916 2184 rundll32.exe 84 PID 2184 wrote to memory of 916 2184 rundll32.exe 84 PID 2184 wrote to memory of 916 2184 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\af046b9f5e2380df8490253570334f14101606d96c958c953fef7307d415bd41N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\af046b9f5e2380df8490253570334f14101606d96c958c953fef7307d415bd41N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:916
-