Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 16:26
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7eceb338622f1c8d3a55be2a4a06dd8397465b920d0ee37d9739953fe11c5dcaN.dll
Resource
win7-20240903-en
windows7-x64
3 signatures
120 seconds
General
-
Target
7eceb338622f1c8d3a55be2a4a06dd8397465b920d0ee37d9739953fe11c5dcaN.dll
-
Size
610KB
-
MD5
ed32dad0734dfa82a2f10b5a56283fa0
-
SHA1
adaf6105d3acdf126126ba4147dec67ebf8653d5
-
SHA256
7eceb338622f1c8d3a55be2a4a06dd8397465b920d0ee37d9739953fe11c5dca
-
SHA512
9e4ffcd7fd124ad63d95f706c8e27b746cf626f5be0805b533c361cca43527a3bddbb4fd6d1a46c24df3378010513a47ad4eb43da45aff0adf3b48065f05cda2
-
SSDEEP
6144:o6C5AXbMn7UI1FoV2gwTBlrIckPJYYYYYYYYYYYYa:o6RI1Fo/wT3cJYYYYYYYYYYYYa
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2676 wrote to memory of 3204 2676 rundll32.exe 82 PID 2676 wrote to memory of 3204 2676 rundll32.exe 82 PID 2676 wrote to memory of 3204 2676 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7eceb338622f1c8d3a55be2a4a06dd8397465b920d0ee37d9739953fe11c5dcaN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7eceb338622f1c8d3a55be2a4a06dd8397465b920d0ee37d9739953fe11c5dcaN.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3204
-