Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 05:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b47d857d1fe0b1e6bac668d48d94ac3f3275e8383611cfddf22aaa9ced61fc2cN.dll
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
General
-
Target
b47d857d1fe0b1e6bac668d48d94ac3f3275e8383611cfddf22aaa9ced61fc2cN.dll
-
Size
768KB
-
MD5
6f89ee0707a66ffed611a07afde5e390
-
SHA1
39afc2aa73ba1ec1d695c7a0771b0b5392864518
-
SHA256
b47d857d1fe0b1e6bac668d48d94ac3f3275e8383611cfddf22aaa9ced61fc2c
-
SHA512
b83be5fd9e5dddb0f2dcc63c51aa46c2f28ba8f8b036b50b3faa55808906fd6599a993e465f61fcf8ffcf40487dc86463912dfa70a860ef058806204e5c0973b
-
SSDEEP
12288:o6RI1Fo/wT3cJYYYYYYYYYYYYmF/RMp86F/RMp8i:oKYT3cQ/uF/u3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1172 wrote to memory of 3992 1172 rundll32.exe 82 PID 1172 wrote to memory of 3992 1172 rundll32.exe 82 PID 1172 wrote to memory of 3992 1172 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b47d857d1fe0b1e6bac668d48d94ac3f3275e8383611cfddf22aaa9ced61fc2cN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b47d857d1fe0b1e6bac668d48d94ac3f3275e8383611cfddf22aaa9ced61fc2cN.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3992
-