Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 13:23
Static task
static1
Behavioral task
behavioral1
Sample
f1b2c8e379ec783b466cd7090ec3b31c5cd4edfc7469d39271ce1a6dacd4462d.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f1b2c8e379ec783b466cd7090ec3b31c5cd4edfc7469d39271ce1a6dacd4462d.dll
Resource
win10v2004-20241007-en
General
-
Target
f1b2c8e379ec783b466cd7090ec3b31c5cd4edfc7469d39271ce1a6dacd4462d.dll
-
Size
6KB
-
MD5
621536fa3640cab389f24fbb6be779f0
-
SHA1
c35144ea9aa44d4ead65e82fd64f4cb8adcd4ed4
-
SHA256
f1b2c8e379ec783b466cd7090ec3b31c5cd4edfc7469d39271ce1a6dacd4462d
-
SHA512
06d20122a5a4e065678b2d012d37c8c65d7ce1834b5f5f43f6db3ceeeb3f5b9cd789e533a442e95deef12c9392e9e859721889c3880543949ab99fbe7e07a5a3
-
SSDEEP
96:hy859x0P8MamuWs23cyM0s1oFQSHRRZEF4Pe/83KekMOJ:F5oLxupRyM0FRGFUe/8Di
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4344 wrote to memory of 4192 4344 rundll32.exe 83 PID 4344 wrote to memory of 4192 4344 rundll32.exe 83 PID 4344 wrote to memory of 4192 4344 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f1b2c8e379ec783b466cd7090ec3b31c5cd4edfc7469d39271ce1a6dacd4462d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f1b2c8e379ec783b466cd7090ec3b31c5cd4edfc7469d39271ce1a6dacd4462d.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4192
-