Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 01:31
Static task
static1
Behavioral task
behavioral1
Sample
81a79774de7d7a2e2de9596e00db7e4d6fe618e4f708f5cf641b69dc8495cf2dN.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
81a79774de7d7a2e2de9596e00db7e4d6fe618e4f708f5cf641b69dc8495cf2dN.dll
Resource
win10v2004-20240802-en
General
-
Target
81a79774de7d7a2e2de9596e00db7e4d6fe618e4f708f5cf641b69dc8495cf2dN.dll
-
Size
6KB
-
MD5
0de9af13a001f64347c72b7ddd364a50
-
SHA1
9a746a389f4043300aa5de46dd033e8d61c53fdc
-
SHA256
81a79774de7d7a2e2de9596e00db7e4d6fe618e4f708f5cf641b69dc8495cf2d
-
SHA512
c4d57ee2604c4cea0950bd350693a3ed29482156dc4f8e2438102a591da7571a72b3dd02138e79b149f69e9cf93149b0a52678bd66ced9b0294eaab922562064
-
SSDEEP
96:hy859x0P8Mav2F6ZPeoi3s396666lFrl66/mZa:F5oLx6ZPfi3s356Z
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2348 3064 rundll32.exe 82 PID 3064 wrote to memory of 2348 3064 rundll32.exe 82 PID 3064 wrote to memory of 2348 3064 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\81a79774de7d7a2e2de9596e00db7e4d6fe618e4f708f5cf641b69dc8495cf2dN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\81a79774de7d7a2e2de9596e00db7e4d6fe618e4f708f5cf641b69dc8495cf2dN.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2348
-