Analysis
-
max time kernel
101s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 04:22
Static task
static1
Behavioral task
behavioral1
Sample
1623ce5e639ed26694b1ec1d16e766514bbf84a687a1a5bbb4c83a3f8547f608N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1623ce5e639ed26694b1ec1d16e766514bbf84a687a1a5bbb4c83a3f8547f608N.dll
Resource
win10v2004-20241007-en
General
-
Target
1623ce5e639ed26694b1ec1d16e766514bbf84a687a1a5bbb4c83a3f8547f608N.dll
-
Size
6KB
-
MD5
3e84c050633a5130957be2e4297a5b80
-
SHA1
432ddb2471534b87cb19e45c33d12c4fae8dd83f
-
SHA256
1623ce5e639ed26694b1ec1d16e766514bbf84a687a1a5bbb4c83a3f8547f608
-
SHA512
cd0f045c6a4a02ca6911149305d8a53ef9cecde970542276a8febaa58b8bc3d7ac2afd5d800dd133e883b628ffef90a87b88842bbd586722c18bdc379a68b4fc
-
SSDEEP
96:z0I9wZLrY0/T4lnNBn4vvN0Ae//BYqIIwN3M/:JKZYA3mBIe/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 316 wrote to memory of 4156 316 rundll32.exe 84 PID 316 wrote to memory of 4156 316 rundll32.exe 84 PID 316 wrote to memory of 4156 316 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1623ce5e639ed26694b1ec1d16e766514bbf84a687a1a5bbb4c83a3f8547f608N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1623ce5e639ed26694b1ec1d16e766514bbf84a687a1a5bbb4c83a3f8547f608N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4156
-