Analysis
-
max time kernel
84s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-10-2024 21:51
Static task
static1
Behavioral task
behavioral1
Sample
24c4212b6907a3b0dfacf42db73a347f6c2351aa38838108f9e712b788e87c5fN.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
24c4212b6907a3b0dfacf42db73a347f6c2351aa38838108f9e712b788e87c5fN.dll
Resource
win10v2004-20241007-en
General
-
Target
24c4212b6907a3b0dfacf42db73a347f6c2351aa38838108f9e712b788e87c5fN.dll
-
Size
5KB
-
MD5
f2819659e586d42468a291dc07f0eb50
-
SHA1
5bfd25f5e1e401b7567391634e4126dc7ab3cf93
-
SHA256
24c4212b6907a3b0dfacf42db73a347f6c2351aa38838108f9e712b788e87c5f
-
SHA512
f56d268102d508d8af415d578e392a685bf235ef0d8fe91439eb681246cf913db0d8becc556b9686a2e1508d887f0086563619d2c843695249988ca03590a6c9
-
SSDEEP
96:hy859x0P8Mafr4cJ9mF8qh/hIJRPfjimVLRI7O7o7DEKs17ZL/JocOJ:F5oLErpwXhZIPf+2tuOmDjs17e
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 268 wrote to memory of 2872 268 rundll32.exe 31 PID 268 wrote to memory of 2872 268 rundll32.exe 31 PID 268 wrote to memory of 2872 268 rundll32.exe 31 PID 268 wrote to memory of 2872 268 rundll32.exe 31 PID 268 wrote to memory of 2872 268 rundll32.exe 31 PID 268 wrote to memory of 2872 268 rundll32.exe 31 PID 268 wrote to memory of 2872 268 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\24c4212b6907a3b0dfacf42db73a347f6c2351aa38838108f9e712b788e87c5fN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\24c4212b6907a3b0dfacf42db73a347f6c2351aa38838108f9e712b788e87c5fN.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2872
-