Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2024 12:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b04cbfc9aa32b54e232837b5e3b110885a59350b9967573dd311e58abc9f90c5N.dll
Resource
win7-20240903-en
windows7-x64
3 signatures
120 seconds
General
-
Target
b04cbfc9aa32b54e232837b5e3b110885a59350b9967573dd311e58abc9f90c5N.dll
-
Size
550KB
-
MD5
1c50d27bf46c8ae217bde009706cdb20
-
SHA1
29f29a9738371d863f0c2b37e577a09e61740ba2
-
SHA256
b04cbfc9aa32b54e232837b5e3b110885a59350b9967573dd311e58abc9f90c5
-
SHA512
7a1437f520d62bb15efc9d64081b30f358ec1c525efd34d28402d81eaf02a89646e6e3ea360c16ea62db25fbcf7b53e353847be56ddcd68e9661bc696e28bebb
-
SSDEEP
6144:o6C5AXbMn7UI1FoV2gwTBlrIckPJYYYYYYYYYYYY2:o6RI1Fo/wT3cJYYYYYYYYYYYY2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2968 wrote to memory of 3508 2968 rundll32.exe 83 PID 2968 wrote to memory of 3508 2968 rundll32.exe 83 PID 2968 wrote to memory of 3508 2968 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b04cbfc9aa32b54e232837b5e3b110885a59350b9967573dd311e58abc9f90c5N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b04cbfc9aa32b54e232837b5e3b110885a59350b9967573dd311e58abc9f90c5N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3508
-