Analysis
-
max time kernel
82s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 06:36
Static task
static1
Behavioral task
behavioral1
Sample
3ad1994f35b7569c8321eec78cdaf7321c4da0a8a98ab84b56538ec39bdcec11N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3ad1994f35b7569c8321eec78cdaf7321c4da0a8a98ab84b56538ec39bdcec11N.dll
Resource
win10v2004-20240802-en
General
-
Target
3ad1994f35b7569c8321eec78cdaf7321c4da0a8a98ab84b56538ec39bdcec11N.dll
-
Size
5KB
-
MD5
4927dd54e5cd0722119ddfaeeb5722a0
-
SHA1
db30bf3023efe5475e475a6dc763bce3dba0dc7c
-
SHA256
3ad1994f35b7569c8321eec78cdaf7321c4da0a8a98ab84b56538ec39bdcec11
-
SHA512
48d158d6f212d2094996fe4e19a12793a5582768167cfabc1da7817657374a403b7e0cb85985957aedbf9c08fe99cba6655117a407b62f7c97472b6bd9fa3679
-
SSDEEP
48:C6VonAHso6U7lYa92RrpjwDmetlG95hx+iMHhiRcD1xfOWurDZf+nnIpIdHjpM69:nEY2RrF1eqwi4LWxh4nOWM6F
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1120 wrote to memory of 2164 1120 rundll32.exe 29 PID 1120 wrote to memory of 2164 1120 rundll32.exe 29 PID 1120 wrote to memory of 2164 1120 rundll32.exe 29 PID 1120 wrote to memory of 2164 1120 rundll32.exe 29 PID 1120 wrote to memory of 2164 1120 rundll32.exe 29 PID 1120 wrote to memory of 2164 1120 rundll32.exe 29 PID 1120 wrote to memory of 2164 1120 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3ad1994f35b7569c8321eec78cdaf7321c4da0a8a98ab84b56538ec39bdcec11N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3ad1994f35b7569c8321eec78cdaf7321c4da0a8a98ab84b56538ec39bdcec11N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2164
-