Analysis
-
max time kernel
140s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2024 21:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4dc6a51cf227bc36e036f26a6805f55b27d8ec7eb2513eaf8736176b55bfb111.dll
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
General
-
Target
4dc6a51cf227bc36e036f26a6805f55b27d8ec7eb2513eaf8736176b55bfb111.dll
-
Size
791KB
-
MD5
e14e0e71d222d52cba0ee7fec6aad777
-
SHA1
0ddb5c388c8401c13fdd6f5f93c3d09d4cf67bfc
-
SHA256
4dc6a51cf227bc36e036f26a6805f55b27d8ec7eb2513eaf8736176b55bfb111
-
SHA512
5a0c73d42f68c7e665c0f1d544234a15ffa5cc93111b8d3013abec399bb7e357b7dd1955f71750129715d0552e5af3df5defb212018212c31c65ee1ec0801893
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0B:jDgtfRQUHPw06MoV2nwTBlhm8Z
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2444 2928 rundll32.exe 84 PID 2928 wrote to memory of 2444 2928 rundll32.exe 84 PID 2928 wrote to memory of 2444 2928 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc6a51cf227bc36e036f26a6805f55b27d8ec7eb2513eaf8736176b55bfb111.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc6a51cf227bc36e036f26a6805f55b27d8ec7eb2513eaf8736176b55bfb111.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2444
-