Analysis
-
max time kernel
99s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2024 13:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
9633f9d9aaf49de71af69de58e4bae5579a552bb7dfab00ba745430ca7f47af6N.dll
Resource
win7-20240903-en
windows7-x64
3 signatures
120 seconds
General
-
Target
9633f9d9aaf49de71af69de58e4bae5579a552bb7dfab00ba745430ca7f47af6N.dll
-
Size
867KB
-
MD5
9f7d3425132ba88122a3599cc064b0b0
-
SHA1
5ff76e97b5b09b758df7201d3155f06cbc8fb86c
-
SHA256
9633f9d9aaf49de71af69de58e4bae5579a552bb7dfab00ba745430ca7f47af6
-
SHA512
9cd9089c6bbe221a1523724dd23ec356a975b6f5a2e97fbd8cb2052cc0dd7bbf517fd7c37f4937e2940b5b43263b548ab1bc72c95e5465b7a32efb3585b80d80
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0r:jDgtfRQUHPw06MoV2nwTBlhm8D
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 224 wrote to memory of 4912 224 rundll32.exe 84 PID 224 wrote to memory of 4912 224 rundll32.exe 84 PID 224 wrote to memory of 4912 224 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9633f9d9aaf49de71af69de58e4bae5579a552bb7dfab00ba745430ca7f47af6N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9633f9d9aaf49de71af69de58e4bae5579a552bb7dfab00ba745430ca7f47af6N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4912
-