Analysis
-
max time kernel
110s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 21:25
Static task
static1
Behavioral task
behavioral1
Sample
f43536703d4a02b394365c70eee22294ff957f70551e7691c6ec550d174730dbN.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f43536703d4a02b394365c70eee22294ff957f70551e7691c6ec550d174730dbN.dll
Resource
win10v2004-20241007-en
General
-
Target
f43536703d4a02b394365c70eee22294ff957f70551e7691c6ec550d174730dbN.dll
-
Size
6KB
-
MD5
552850521b353820c05836594ba49730
-
SHA1
ff02a8b8dab22b65482029bd4090af9c1a64cf35
-
SHA256
f43536703d4a02b394365c70eee22294ff957f70551e7691c6ec550d174730db
-
SHA512
c22d16a2cdfcbe3b967c7dd04b20e53e413f934e2bcd55a74b0672bdbd630b34636d7f13e6a597c482baa68e970029a07ec43dcd5732f5720f4adbf044d4c6ab
-
SSDEEP
96:hy859x0P8MaweSnyFQc1q7OqMRQcj0rG6d52kzR9tM0O:F5oLbnG87GQcgrGQ5Nzfk
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2764 wrote to memory of 3616 2764 rundll32.exe 84 PID 2764 wrote to memory of 3616 2764 rundll32.exe 84 PID 2764 wrote to memory of 3616 2764 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f43536703d4a02b394365c70eee22294ff957f70551e7691c6ec550d174730dbN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f43536703d4a02b394365c70eee22294ff957f70551e7691c6ec550d174730dbN.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3616
-