Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-10-2024 18:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
014c7e872b5c0913d830a121ed9ddfbf1ee2a7fb449345261ccb319ed4e6ae7e.dll
Resource
win7-20241010-en
windows7-x64
3 signatures
150 seconds
General
-
Target
014c7e872b5c0913d830a121ed9ddfbf1ee2a7fb449345261ccb319ed4e6ae7e.dll
-
Size
868KB
-
MD5
77a876475e0c2b03919fddfa1ac29365
-
SHA1
e9d3868c1f77308585e8d42b69b659f3452309ce
-
SHA256
014c7e872b5c0913d830a121ed9ddfbf1ee2a7fb449345261ccb319ed4e6ae7e
-
SHA512
6c5c7bdf815e3043d024812deb3fed7c7056c711fea1ecff9ef81c58a1e75126a612a948002087d68b947a8f7e79ad66e051956269e618f200121d081204e60a
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0T:jDgtfRQUHPw06MoV2nwTBlhm8L
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1844 wrote to memory of 2600 1844 rundll32.exe 84 PID 1844 wrote to memory of 2600 1844 rundll32.exe 84 PID 1844 wrote to memory of 2600 1844 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\014c7e872b5c0913d830a121ed9ddfbf1ee2a7fb449345261ccb319ed4e6ae7e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\014c7e872b5c0913d830a121ed9ddfbf1ee2a7fb449345261ccb319ed4e6ae7e.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2600
-