Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 12:24
Static task
static1
Behavioral task
behavioral1
Sample
1ddb5afb64b10ef38ffc685bd81e1bdb259de5cb0ca8837a87913f50d7ae82f8N.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
1ddb5afb64b10ef38ffc685bd81e1bdb259de5cb0ca8837a87913f50d7ae82f8N.dll
Resource
win10v2004-20241007-en
General
-
Target
1ddb5afb64b10ef38ffc685bd81e1bdb259de5cb0ca8837a87913f50d7ae82f8N.dll
-
Size
1KB
-
MD5
88e661590a5651ec810fdd797d9d2700
-
SHA1
3435c4f384ee36c0dabb8fbc4dd525381e3c37df
-
SHA256
1ddb5afb64b10ef38ffc685bd81e1bdb259de5cb0ca8837a87913f50d7ae82f8
-
SHA512
b591d8f182f867778d948cc5aaf288431ce08a53065628e9b0f0a8ec5a12e3e77b2f52982d3bee9e53e4371b7baee005af2aabf9cc5052b9cf498987306ff779
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3288 wrote to memory of 4752 3288 rundll32.exe 83 PID 3288 wrote to memory of 4752 3288 rundll32.exe 83 PID 3288 wrote to memory of 4752 3288 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1ddb5afb64b10ef38ffc685bd81e1bdb259de5cb0ca8837a87913f50d7ae82f8N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1ddb5afb64b10ef38ffc685bd81e1bdb259de5cb0ca8837a87913f50d7ae82f8N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4752
-