Analysis
-
max time kernel
97s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 02:10
Static task
static1
Behavioral task
behavioral1
Sample
acbb75884ac19fa90da6b307cb8658fd229cf05cb966657a7baf38d7debfed4b.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
acbb75884ac19fa90da6b307cb8658fd229cf05cb966657a7baf38d7debfed4b.dll
Resource
win10v2004-20241007-en
General
-
Target
acbb75884ac19fa90da6b307cb8658fd229cf05cb966657a7baf38d7debfed4b.dll
-
Size
5KB
-
MD5
a9f959177c4a76dc9d614864f70d1f98
-
SHA1
e5ddbae3a9adf8c1631bf7c771aeced3030ce716
-
SHA256
acbb75884ac19fa90da6b307cb8658fd229cf05cb966657a7baf38d7debfed4b
-
SHA512
1ab349b39ef4c1c8db45f29568d48a98ecaf760782dcba1a3c5e4997250bc2ebbfd7fb1670276a6dfb6083dbccd50e24bd2dba60bb3490cdbf3414544ded4454
-
SSDEEP
48:CCy86+Wet9Q/iooHeiefhe+/lSMYEqu8sw5hHE5AiwxehDKN7endQ+JLmN:hy859x0P8Maue59ZOG7endPmN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5088 wrote to memory of 628 5088 rundll32.exe 82 PID 5088 wrote to memory of 628 5088 rundll32.exe 82 PID 5088 wrote to memory of 628 5088 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\acbb75884ac19fa90da6b307cb8658fd229cf05cb966657a7baf38d7debfed4b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\acbb75884ac19fa90da6b307cb8658fd229cf05cb966657a7baf38d7debfed4b.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:628
-