Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 04:35
Static task
static1
Behavioral task
behavioral1
Sample
49f8c2481b574b29e7700652de8f66acd942e5e65aa6e8ebdabcabba9c86f828N.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
49f8c2481b574b29e7700652de8f66acd942e5e65aa6e8ebdabcabba9c86f828N.dll
Resource
win10v2004-20241007-en
General
-
Target
49f8c2481b574b29e7700652de8f66acd942e5e65aa6e8ebdabcabba9c86f828N.dll
-
Size
4KB
-
MD5
3139b0679eeb6e254359ff3739cb28d0
-
SHA1
c424c5c84f0b3061f6aad6f0a03528384cca1a6e
-
SHA256
49f8c2481b574b29e7700652de8f66acd942e5e65aa6e8ebdabcabba9c86f828
-
SHA512
ea57177f46cb717e1286cc7770b581fa1d76a159e642588a1ba6cbe631901bd3b451d6beba7de5efa391550669204abb2a5569430e37009164fa3759e365233d
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2224 wrote to memory of 1636 2224 rundll32.exe 83 PID 2224 wrote to memory of 1636 2224 rundll32.exe 83 PID 2224 wrote to memory of 1636 2224 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\49f8c2481b574b29e7700652de8f66acd942e5e65aa6e8ebdabcabba9c86f828N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\49f8c2481b574b29e7700652de8f66acd942e5e65aa6e8ebdabcabba9c86f828N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1636
-