Analysis
-
max time kernel
94s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 12:15
Static task
static1
Behavioral task
behavioral1
Sample
324b43b55a0ddc92488736a3803a40b5f9feeb4518b0eb26df9ae33db9efbe71N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
324b43b55a0ddc92488736a3803a40b5f9feeb4518b0eb26df9ae33db9efbe71N.dll
Resource
win10v2004-20240802-en
General
-
Target
324b43b55a0ddc92488736a3803a40b5f9feeb4518b0eb26df9ae33db9efbe71N.dll
-
Size
4KB
-
MD5
2ef9e74eaccdba3a1c6994ae8abd9100
-
SHA1
d924b38db3d0976753b1bcd33edab692659ea5dc
-
SHA256
324b43b55a0ddc92488736a3803a40b5f9feeb4518b0eb26df9ae33db9efbe71
-
SHA512
729de1b2a72ffbb7253587a8e85f7cf2ad77715bb199b5d5efdc6d59cf29db9c570f825982fc726edd2ed6a08a602657ebc3717d863ab2fb7d10b8e782f89926
-
SSDEEP
48:SWkO0IoyTnXz+ihZjokVoVUoS+cxZfKA4qm2VxtHF+M:ZJTnXzvokpNKA9Rxr+M
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4240 wrote to memory of 5088 4240 rundll32.exe 83 PID 4240 wrote to memory of 5088 4240 rundll32.exe 83 PID 4240 wrote to memory of 5088 4240 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\324b43b55a0ddc92488736a3803a40b5f9feeb4518b0eb26df9ae33db9efbe71N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\324b43b55a0ddc92488736a3803a40b5f9feeb4518b0eb26df9ae33db9efbe71N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:5088
-