Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/10/2024, 08:28
Static task
static1
Behavioral task
behavioral1
Sample
632fb483725be49fe5f5b13aa5ea2375f869b27eebadefad28b89db8ec975803N.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
632fb483725be49fe5f5b13aa5ea2375f869b27eebadefad28b89db8ec975803N.dll
Resource
win10v2004-20240802-en
General
-
Target
632fb483725be49fe5f5b13aa5ea2375f869b27eebadefad28b89db8ec975803N.dll
-
Size
6KB
-
MD5
0e0d50422adc0b9529c97a486e33cf70
-
SHA1
70e445591e0dce60dc7ea70cc968fbc382288f24
-
SHA256
632fb483725be49fe5f5b13aa5ea2375f869b27eebadefad28b89db8ec975803
-
SHA512
f80c0092bdf9a6343ff108d3c5def7d99bd12d0f5bbb177086a25d2756425e6bf2e6ff4b2966e1723f0a7d0fd91ef95dbe3e88c562b02ac2ede048d7dac269e8
-
SSDEEP
48:63mll5YVOa9VUX1iwbQWu0pB+BDq9J5SH:VDa9VUX9bQWJB+FqX5SH
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4052 wrote to memory of 1176 4052 rundll32.exe 84 PID 4052 wrote to memory of 1176 4052 rundll32.exe 84 PID 4052 wrote to memory of 1176 4052 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\632fb483725be49fe5f5b13aa5ea2375f869b27eebadefad28b89db8ec975803N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\632fb483725be49fe5f5b13aa5ea2375f869b27eebadefad28b89db8ec975803N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1176
-