Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 08:22
Static task
static1
Behavioral task
behavioral1
Sample
0fde0e50e152d162b7a2ae9b71a9fbe612bff043e8ff133ce8e3f10f65645660N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0fde0e50e152d162b7a2ae9b71a9fbe612bff043e8ff133ce8e3f10f65645660N.dll
Resource
win10v2004-20240802-en
General
-
Target
0fde0e50e152d162b7a2ae9b71a9fbe612bff043e8ff133ce8e3f10f65645660N.dll
-
Size
7KB
-
MD5
3be460c34ee5ee3881c65e0ae5683520
-
SHA1
85b481b28b47b0c881da62071098950167db12c2
-
SHA256
0fde0e50e152d162b7a2ae9b71a9fbe612bff043e8ff133ce8e3f10f65645660
-
SHA512
b46f6cb6566d1d5a29391c358d1378e57158b62f84e9d067cfb94bf21592d497417b63c2943d7c635046bc384694e2c02f0136589c625fd7abc8e96df11970c3
-
SSDEEP
96:DixZjmjtjd8jPjcZGR5TImTnLv1s/PTE2wAK4fX1Xekor6ov3Nrno:unSR6bgYvTnj1s3TpEkX1OkouE3Ro
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3700 wrote to memory of 1920 3700 rundll32.exe 82 PID 3700 wrote to memory of 1920 3700 rundll32.exe 82 PID 3700 wrote to memory of 1920 3700 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0fde0e50e152d162b7a2ae9b71a9fbe612bff043e8ff133ce8e3f10f65645660N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0fde0e50e152d162b7a2ae9b71a9fbe612bff043e8ff133ce8e3f10f65645660N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1920
-