Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 08:49
Static task
static1
Behavioral task
behavioral1
Sample
5523d8e5e2eda55a3828b6b93237e21b2c56598a617232f3584141d62c1aaa0dN.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
5523d8e5e2eda55a3828b6b93237e21b2c56598a617232f3584141d62c1aaa0dN.dll
Resource
win10v2004-20240802-en
General
-
Target
5523d8e5e2eda55a3828b6b93237e21b2c56598a617232f3584141d62c1aaa0dN.dll
-
Size
66KB
-
MD5
ff784b05149f00bf6afe129ac9cad770
-
SHA1
f189311bbd62d4adcc3ac983461c8b9840824ff2
-
SHA256
5523d8e5e2eda55a3828b6b93237e21b2c56598a617232f3584141d62c1aaa0d
-
SHA512
aaa1bd69970bde55fb594edeb8f627bc4604293778e1304d3bc2a01e94a4140337c6d55e8ddf64a87c79fce3ad42d64ad0defd02f95f4af4cca6d88ae3170e52
-
SSDEEP
1536:8Cn2dQoiQhPeCZHmjw02Y8rkaVINMwmpSqn:viGr2lrnINM5tn
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1952 wrote to memory of 4772 1952 rundll32.exe 81 PID 1952 wrote to memory of 4772 1952 rundll32.exe 81 PID 1952 wrote to memory of 4772 1952 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5523d8e5e2eda55a3828b6b93237e21b2c56598a617232f3584141d62c1aaa0dN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5523d8e5e2eda55a3828b6b93237e21b2c56598a617232f3584141d62c1aaa0dN.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4772
-