Analysis
-
max time kernel
107s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-10-2024 23:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6b037f5e5d25aa075ca584773e1c855ffcd14c0dd8634027e1900231d2762f6cN.dll
Resource
win7-20240903-en
windows7-x64
3 signatures
120 seconds
General
-
Target
6b037f5e5d25aa075ca584773e1c855ffcd14c0dd8634027e1900231d2762f6cN.dll
-
Size
869KB
-
MD5
ce633228dbc41885e4f1b2c79dd3ca90
-
SHA1
3e8138ac9a63e0a5ebd2f70c296a1596f81f81d3
-
SHA256
6b037f5e5d25aa075ca584773e1c855ffcd14c0dd8634027e1900231d2762f6c
-
SHA512
63d372f6b3cc96c6cdece26dad6d4cbb5d13e7b911221727aed4b9c7a6d3ea80c20077e4170751df8ed550046a2315d0d41cb3d506fb4a2c88d0cb16ceb746f2
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0Q:jDgtfRQUHPw06MoV2nwTBlhm8Y
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5064 wrote to memory of 4432 5064 rundll32.exe 84 PID 5064 wrote to memory of 4432 5064 rundll32.exe 84 PID 5064 wrote to memory of 4432 5064 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6b037f5e5d25aa075ca584773e1c855ffcd14c0dd8634027e1900231d2762f6cN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6b037f5e5d25aa075ca584773e1c855ffcd14c0dd8634027e1900231d2762f6cN.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4432
-