Analysis
-
max time kernel
97s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 22:10
Static task
static1
Behavioral task
behavioral1
Sample
80648793cb3483932e163f6672b4932d19086ce6978ad0f119ce893ba9a0ddeeN.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
80648793cb3483932e163f6672b4932d19086ce6978ad0f119ce893ba9a0ddeeN.dll
Resource
win10v2004-20240802-en
General
-
Target
80648793cb3483932e163f6672b4932d19086ce6978ad0f119ce893ba9a0ddeeN.dll
-
Size
6KB
-
MD5
922be559d938908d7301f12dd365dc90
-
SHA1
7b4b35846cf9feaf0446e33b3ac0912285a7092f
-
SHA256
80648793cb3483932e163f6672b4932d19086ce6978ad0f119ce893ba9a0ddee
-
SHA512
318c16c06eb172c19d48102745b96ecf07ed7c06e2bc82a437f167c1a8af9302f56a751810290fbba8461b574a5b9779ba659725c9f1d98f34217a7e3fc2ae66
-
SSDEEP
96:hy859x0P8Mau2265l9Vny9lB8u97owJzEV2GU:F5oL722ul9mB8P9V2GU
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4612 wrote to memory of 3928 4612 rundll32.exe 82 PID 4612 wrote to memory of 3928 4612 rundll32.exe 82 PID 4612 wrote to memory of 3928 4612 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\80648793cb3483932e163f6672b4932d19086ce6978ad0f119ce893ba9a0ddeeN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\80648793cb3483932e163f6672b4932d19086ce6978ad0f119ce893ba9a0ddeeN.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3928
-