Analysis
-
max time kernel
125s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 21:27
Static task
static1
Behavioral task
behavioral1
Sample
4bd79f4943df6d9320c3fe7e6e6508cc2b3691be501ae351cac66f8cdd1155b1.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4bd79f4943df6d9320c3fe7e6e6508cc2b3691be501ae351cac66f8cdd1155b1.dll
Resource
win10v2004-20240802-en
General
-
Target
4bd79f4943df6d9320c3fe7e6e6508cc2b3691be501ae351cac66f8cdd1155b1.dll
-
Size
6KB
-
MD5
0e91a163d6c8d1c190e3ac958175727c
-
SHA1
ffb4f075f442050f29b2113ee58dea4208094d5c
-
SHA256
4bd79f4943df6d9320c3fe7e6e6508cc2b3691be501ae351cac66f8cdd1155b1
-
SHA512
008325e3f74913737635b33359c6756c93c9860de35376ddced24669264e9a91f87b3cfe70721b87b35fca4ede23a0375bbec513083b3d56d0070281debc1364
-
SSDEEP
96:nEY2RrF1eqwi4+Cts7x7v9drQASFF/bCOyLHA6H:EHRh1eppqd7v99pSFNyLHAy
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4808 wrote to memory of 4568 4808 rundll32.exe 89 PID 4808 wrote to memory of 4568 4808 rundll32.exe 89 PID 4808 wrote to memory of 4568 4808 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4bd79f4943df6d9320c3fe7e6e6508cc2b3691be501ae351cac66f8cdd1155b1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4bd79f4943df6d9320c3fe7e6e6508cc2b3691be501ae351cac66f8cdd1155b1.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3976,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=4156 /prefetch:81⤵PID:3008