Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 10:45
Static task
static1
Behavioral task
behavioral1
Sample
c68d2848653c511da9e6c2000e020e46137cd3ae8b927c669e095edaa935c02fN.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c68d2848653c511da9e6c2000e020e46137cd3ae8b927c669e095edaa935c02fN.dll
Resource
win10v2004-20240802-en
General
-
Target
c68d2848653c511da9e6c2000e020e46137cd3ae8b927c669e095edaa935c02fN.dll
-
Size
5KB
-
MD5
7aeabc7021f8be311dd014baa57f89b0
-
SHA1
c9a7c5ba928023a39e3a9871060770c11a7e03f2
-
SHA256
c68d2848653c511da9e6c2000e020e46137cd3ae8b927c669e095edaa935c02f
-
SHA512
d61c76a1a91476a0159585875bd3de4b4addfb94db9d0f95ea736bad1c39713972f01c1a06dca0f21b8faf902d4d81570aef4a0bcdf8524505c685fa06823534
-
SSDEEP
48:C6VonAHso6U7lYa92RrpjwDmetlG95hx+iMHhmzQXkBqbLhL1kzD5fDDZDZSerOD:nEY2RrF1eqwi4w3nN1O5Hn
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4040 wrote to memory of 3944 4040 rundll32.exe 82 PID 4040 wrote to memory of 3944 4040 rundll32.exe 82 PID 4040 wrote to memory of 3944 4040 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c68d2848653c511da9e6c2000e020e46137cd3ae8b927c669e095edaa935c02fN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c68d2848653c511da9e6c2000e020e46137cd3ae8b927c669e095edaa935c02fN.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3944
-