Analysis
-
max time kernel
139s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-10-2024 21:26
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
49deea410fe98d044664fe2f31946c8d985b7eec997c8690add1f23f876dc5d5.dll
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
General
-
Target
49deea410fe98d044664fe2f31946c8d985b7eec997c8690add1f23f876dc5d5.dll
-
Size
862KB
-
MD5
871ba96f0ee1eb38145b6666639fc923
-
SHA1
e2d387473e0d2de8f582f742016868ec7b451814
-
SHA256
49deea410fe98d044664fe2f31946c8d985b7eec997c8690add1f23f876dc5d5
-
SHA512
79117ea1e44269392729929b1b961946d07f179bb7f27bacefc99d7f7995fe80586cd4c5dbe52a9f3a5054e95b2aa887a8c7dd90becfa6881966af97992cf443
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0H:jDgtfRQUHPw06MoV2nwTBlhm8f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3832 wrote to memory of 2984 3832 rundll32.exe 84 PID 3832 wrote to memory of 2984 3832 rundll32.exe 84 PID 3832 wrote to memory of 2984 3832 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\49deea410fe98d044664fe2f31946c8d985b7eec997c8690add1f23f876dc5d5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\49deea410fe98d044664fe2f31946c8d985b7eec997c8690add1f23f876dc5d5.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2984
-