Analysis
-
max time kernel
93s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 12:45
Static task
static1
Behavioral task
behavioral1
Sample
35119a1b220b25d2e5ff1e23c2f4ab26f2a20846d94317ad2e3e4ce7205ca2e4N.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
35119a1b220b25d2e5ff1e23c2f4ab26f2a20846d94317ad2e3e4ce7205ca2e4N.dll
Resource
win10v2004-20240802-en
General
-
Target
35119a1b220b25d2e5ff1e23c2f4ab26f2a20846d94317ad2e3e4ce7205ca2e4N.dll
-
Size
5KB
-
MD5
add1ea02d958ae4a2a12fe090b219270
-
SHA1
a6f629b15192a7f0051d3ee1b35152b6a1515569
-
SHA256
35119a1b220b25d2e5ff1e23c2f4ab26f2a20846d94317ad2e3e4ce7205ca2e4
-
SHA512
91fac63871096849f7eac1b68d091d224ab377768ad15143d3391fb6b9e0bd3fe86827880d855998a879253f6b320fcec74043c202e53177122480fa19f0e1d3
-
SSDEEP
48:SfIBj0W6/aGxkaklS4rklStklSd8klSPklSTIZGifi5qwlGsPvwacAxiGjnlW:DixZjmjtjd8jPjcZGR5TIa
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1272 wrote to memory of 4540 1272 rundll32.exe 82 PID 1272 wrote to memory of 4540 1272 rundll32.exe 82 PID 1272 wrote to memory of 4540 1272 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\35119a1b220b25d2e5ff1e23c2f4ab26f2a20846d94317ad2e3e4ce7205ca2e4N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\35119a1b220b25d2e5ff1e23c2f4ab26f2a20846d94317ad2e3e4ce7205ca2e4N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4540
-