Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 06:39
Static task
static1
Behavioral task
behavioral1
Sample
2994d57a2478dae9ee5fb951afc188b739a79081982c7d59f58bb8793a84d057N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2994d57a2478dae9ee5fb951afc188b739a79081982c7d59f58bb8793a84d057N.dll
Resource
win10v2004-20241007-en
General
-
Target
2994d57a2478dae9ee5fb951afc188b739a79081982c7d59f58bb8793a84d057N.dll
-
Size
6KB
-
MD5
8d3042dba26de918e34bee3d80ab90a0
-
SHA1
f986703a51d0307eea711be1daf37c6668aa71aa
-
SHA256
2994d57a2478dae9ee5fb951afc188b739a79081982c7d59f58bb8793a84d057
-
SHA512
e7d08726a68c5ec2cc5d9ee554a4e37750ba37966e222032c5a0f79b47492b32498878f7fb27de3098aa54415eb0723bd5d82f5ee260a9162ec8132567f79112
-
SSDEEP
48:CCy86+Wet9Q/iooHeiefhe+/lSMYEqyID1qWP/EjkDq9Z1azg9XgibKVthb:hy859x0P8MaK6sou9ZW+G1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3604 wrote to memory of 4656 3604 rundll32.exe 83 PID 3604 wrote to memory of 4656 3604 rundll32.exe 83 PID 3604 wrote to memory of 4656 3604 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2994d57a2478dae9ee5fb951afc188b739a79081982c7d59f58bb8793a84d057N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2994d57a2478dae9ee5fb951afc188b739a79081982c7d59f58bb8793a84d057N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4656
-