Analysis
-
max time kernel
139s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-10-2024 21:48
Static task
static1
Behavioral task
behavioral1
Sample
50bb21395dcbbafe40ff55b6640e32f76db815da11c92589e38540ca9fca3f3a.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
50bb21395dcbbafe40ff55b6640e32f76db815da11c92589e38540ca9fca3f3a.dll
Resource
win10v2004-20241007-en
General
-
Target
50bb21395dcbbafe40ff55b6640e32f76db815da11c92589e38540ca9fca3f3a.dll
-
Size
808KB
-
MD5
adb014ce37298d6188b2f05d476f00dc
-
SHA1
8be7f4d7cc69d8cf8218a0930edb88a5020fe202
-
SHA256
50bb21395dcbbafe40ff55b6640e32f76db815da11c92589e38540ca9fca3f3a
-
SHA512
9cb47b81727e3fe58efe1a976ce0eb0cffa336cc52e2aa004db73dfefbb549b5f79d1e2ef3a7861e1255419943cdc4f8538de32e78e134db9b07a7e3ab65275b
-
SSDEEP
24576:yZjT/km8XsAX0gP6jVvbqJXETX8+gnuh0s:MyXskCV+JMM+gnuh0s
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4208 wrote to memory of 468 4208 rundll32.exe 85 PID 4208 wrote to memory of 468 4208 rundll32.exe 85 PID 4208 wrote to memory of 468 4208 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\50bb21395dcbbafe40ff55b6640e32f76db815da11c92589e38540ca9fca3f3a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\50bb21395dcbbafe40ff55b6640e32f76db815da11c92589e38540ca9fca3f3a.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:468
-