Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 19:54
Static task
static1
Behavioral task
behavioral1
Sample
220f5623226f8ceb9919099ab5cd9b98789dcb3939d4ab16791bd13e6129e8c0N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
220f5623226f8ceb9919099ab5cd9b98789dcb3939d4ab16791bd13e6129e8c0N.dll
Resource
win10v2004-20241007-en
General
-
Target
220f5623226f8ceb9919099ab5cd9b98789dcb3939d4ab16791bd13e6129e8c0N.dll
-
Size
3KB
-
MD5
1bc367a8e7b05ba3320199a7e1d3c840
-
SHA1
4814bf0a94fd8a0c6835fd793557322b0149ac28
-
SHA256
220f5623226f8ceb9919099ab5cd9b98789dcb3939d4ab16791bd13e6129e8c0
-
SHA512
1c86c444a8029566168fad09649cc17021812d3621719c6d8fea7c53ccaa81371708516566eec086f149d2031cb38d53ad1ef24b93f409f9ad1f6783b7723d45
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4548 wrote to memory of 692 4548 rundll32.exe 83 PID 4548 wrote to memory of 692 4548 rundll32.exe 83 PID 4548 wrote to memory of 692 4548 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\220f5623226f8ceb9919099ab5cd9b98789dcb3939d4ab16791bd13e6129e8c0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\220f5623226f8ceb9919099ab5cd9b98789dcb3939d4ab16791bd13e6129e8c0N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:692
-