Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 22:16
Static task
static1
Behavioral task
behavioral1
Sample
13292e294e356363b4bbf38535a422cef537b12ed92bdc5b607ae8d2dce93dffN.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
13292e294e356363b4bbf38535a422cef537b12ed92bdc5b607ae8d2dce93dffN.dll
Resource
win10v2004-20240802-en
General
-
Target
13292e294e356363b4bbf38535a422cef537b12ed92bdc5b607ae8d2dce93dffN.dll
-
Size
6KB
-
MD5
a57a56b6b96d21f68c3a2b62b7b5a2d0
-
SHA1
53259f857e31e35e8e399a0f3dd9f067fec9aafe
-
SHA256
13292e294e356363b4bbf38535a422cef537b12ed92bdc5b607ae8d2dce93dff
-
SHA512
afa7962bce1a5f0e930c96ecc3c6674b717142b3d3b52dc4acf84dca3a16fc25a2ebeadc8e7cf41e83b2656d33ec90e30a55d6fd54e26500d6a810aef93b685a
-
SSDEEP
96:nEY2RrF1eqwi4CBf5Jd5ZbmALl0Py3wHeio+cCrmLaH:EHRh1eppCBf5Jd5Zb/0Py3w+io+cNLc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4192 wrote to memory of 3228 4192 rundll32.exe 82 PID 4192 wrote to memory of 3228 4192 rundll32.exe 82 PID 4192 wrote to memory of 3228 4192 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\13292e294e356363b4bbf38535a422cef537b12ed92bdc5b607ae8d2dce93dffN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\13292e294e356363b4bbf38535a422cef537b12ed92bdc5b607ae8d2dce93dffN.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3228
-