Analysis
-
max time kernel
95s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2024 01:08
Behavioral task
behavioral1
Sample
be5e4c1450e7673500206a30bc02b96351906d45522e137a687c9f93eced0614.dll
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
be5e4c1450e7673500206a30bc02b96351906d45522e137a687c9f93eced0614.dll
Resource
win10v2004-20241007-en
General
-
Target
be5e4c1450e7673500206a30bc02b96351906d45522e137a687c9f93eced0614.dll
-
Size
2.9MB
-
MD5
32936373efb0ed64f9f0c4e7758092b1
-
SHA1
f65e5b36d525688f89ce69c2312816d70bc0477d
-
SHA256
be5e4c1450e7673500206a30bc02b96351906d45522e137a687c9f93eced0614
-
SHA512
91c6f7468e07be5199181bb54bda70f417c2db293d8fc475184cf085c14ad4e4aba77bce5cfd9e032d1ab3f8761078ed46d4b3381c76414817480377ac4c6569
-
SSDEEP
49152:PO9hnRJ/JjXTVFi0en/CLDzKv63Tu2jj6Sq03xg/pOFMy:PO9hnH9XTVFd2/CGv63T/5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1824 wrote to memory of 2008 1824 rundll32.exe 83 PID 1824 wrote to memory of 2008 1824 rundll32.exe 83 PID 1824 wrote to memory of 2008 1824 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\be5e4c1450e7673500206a30bc02b96351906d45522e137a687c9f93eced0614.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\be5e4c1450e7673500206a30bc02b96351906d45522e137a687c9f93eced0614.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2008
-