Analysis
-
max time kernel
96s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 20:24
Static task
static1
Behavioral task
behavioral1
Sample
5846e5819dbd915b554159772a0ded07300f7b93016e1fbbaa1fdf50db304addN.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5846e5819dbd915b554159772a0ded07300f7b93016e1fbbaa1fdf50db304addN.dll
Resource
win10v2004-20240802-en
General
-
Target
5846e5819dbd915b554159772a0ded07300f7b93016e1fbbaa1fdf50db304addN.dll
-
Size
6KB
-
MD5
7310b05793508fff29c1c3260ec83550
-
SHA1
471ba631a27a329d3039b66883b4a5a4be09f5a0
-
SHA256
5846e5819dbd915b554159772a0ded07300f7b93016e1fbbaa1fdf50db304add
-
SHA512
8171129c72063e972e281d4501ae23c547af83626a6ba72ac9136c0c3e83b80830795b583f673ffd0aeed10ed369ac492e489dbe9abd24ff7cdac5854f0f8846
-
SSDEEP
48:6AA35YVOQDV8FszwydlAYsLFV3G0dB+BDq9J5S2:0QDV8FscMjsLFV3FB+FqX5S2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2140 wrote to memory of 1696 2140 rundll32.exe 82 PID 2140 wrote to memory of 1696 2140 rundll32.exe 82 PID 2140 wrote to memory of 1696 2140 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5846e5819dbd915b554159772a0ded07300f7b93016e1fbbaa1fdf50db304addN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5846e5819dbd915b554159772a0ded07300f7b93016e1fbbaa1fdf50db304addN.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1696
-