Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2024 00:52
Static task
static1
Behavioral task
behavioral1
Sample
f7375f6e97acd4abd6a8250b4bfb2466b0dbebc0192a6147e67b2362888139fcN.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f7375f6e97acd4abd6a8250b4bfb2466b0dbebc0192a6147e67b2362888139fcN.dll
Resource
win10v2004-20241007-en
General
-
Target
f7375f6e97acd4abd6a8250b4bfb2466b0dbebc0192a6147e67b2362888139fcN.dll
-
Size
116KB
-
MD5
90e68b77c46e2a6857dade11307f3930
-
SHA1
84fb4d2974c0e6993e4e8feedf27c15d0df4ddcf
-
SHA256
f7375f6e97acd4abd6a8250b4bfb2466b0dbebc0192a6147e67b2362888139fc
-
SHA512
058e02ecc49fd7b1a04bb9a586aae145eca17674b959ed10ff62178ae6690108cddb69a542bff1c2de16341ae9cfbc0dfe5a360eeb78ec1b3eb7182d11cd053e
-
SSDEEP
3072:7tvBBUKXrgHiLOCZ1RDt8uS51Y3VlAdHkhCocN:pBBLsHiLOI5hekh6N
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3604 wrote to memory of 2292 3604 rundll32.exe 83 PID 3604 wrote to memory of 2292 3604 rundll32.exe 83 PID 3604 wrote to memory of 2292 3604 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f7375f6e97acd4abd6a8250b4bfb2466b0dbebc0192a6147e67b2362888139fcN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f7375f6e97acd4abd6a8250b4bfb2466b0dbebc0192a6147e67b2362888139fcN.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2292
-