Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 06:37
Static task
static1
Behavioral task
behavioral1
Sample
7d1533bc05d36815783cee64b3c4cfd6ddfb9d6787adabcd472aec8902d855aaN.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7d1533bc05d36815783cee64b3c4cfd6ddfb9d6787adabcd472aec8902d855aaN.dll
Resource
win10v2004-20240802-en
General
-
Target
7d1533bc05d36815783cee64b3c4cfd6ddfb9d6787adabcd472aec8902d855aaN.dll
-
Size
6KB
-
MD5
3bbb2ffeea78234d7d20719f042d9a10
-
SHA1
0217ffd66514f927f44609ef38d98e060c9ad223
-
SHA256
7d1533bc05d36815783cee64b3c4cfd6ddfb9d6787adabcd472aec8902d855aa
-
SHA512
e8512908d2ecbed7bb5795f4915cfa19599100a68f2ed7d6d576ee19bdeb1a2b3e5d70b9480d0c19295905d958891034601178000db6dee4c51d978fdd47e50c
-
SSDEEP
48:63mll5YVOa9VUX1iwbQWu0PcB+BDq9J5SH:VDa9VUX9bQWvcB+FqX5SH
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3344 wrote to memory of 3004 3344 rundll32.exe 89 PID 3344 wrote to memory of 3004 3344 rundll32.exe 89 PID 3344 wrote to memory of 3004 3344 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7d1533bc05d36815783cee64b3c4cfd6ddfb9d6787adabcd472aec8902d855aaN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7d1533bc05d36815783cee64b3c4cfd6ddfb9d6787adabcd472aec8902d855aaN.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3960,i,15436195446242760253,4000484513008731869,262144 --variations-seed-version --mojo-platform-channel-handle=1760 /prefetch:81⤵PID:1412