Analysis
-
max time kernel
101s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 01:23
Static task
static1
Behavioral task
behavioral1
Sample
f30e5ba857d38401635dd21807dd16b148e59686f2681ed9255006a84041a8abN.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f30e5ba857d38401635dd21807dd16b148e59686f2681ed9255006a84041a8abN.dll
Resource
win10v2004-20241007-en
General
-
Target
f30e5ba857d38401635dd21807dd16b148e59686f2681ed9255006a84041a8abN.dll
-
Size
93KB
-
MD5
03f5e0b5e81c6fbeb849dee24a80e930
-
SHA1
616f89f16ff11ac2217456f3f6ea017a6c9cb1e4
-
SHA256
f30e5ba857d38401635dd21807dd16b148e59686f2681ed9255006a84041a8ab
-
SHA512
80b52ce3498080676fa3c824bf7fd9b1889122f2807456d7a8192f909e31d36c0032067fd8b4b7840c29208669673c1171da26f18caac88649b9f03751c6bace
-
SSDEEP
1536:kM/MndxPBA3W11Tu1b4SjJcujxuQ7bqKT:PYf23W1ub4sJcujxLbh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2156 wrote to memory of 4784 2156 rundll32.exe 84 PID 2156 wrote to memory of 4784 2156 rundll32.exe 84 PID 2156 wrote to memory of 4784 2156 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f30e5ba857d38401635dd21807dd16b148e59686f2681ed9255006a84041a8abN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f30e5ba857d38401635dd21807dd16b148e59686f2681ed9255006a84041a8abN.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4784
-