Analysis
-
max time kernel
93s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 14:00
Static task
static1
Behavioral task
behavioral1
Sample
009a1e1a6e7d68d11252538033e73cc5ad0fa4187507d510606cc2151ef77bdd.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
009a1e1a6e7d68d11252538033e73cc5ad0fa4187507d510606cc2151ef77bdd.dll
Resource
win10v2004-20241007-en
General
-
Target
009a1e1a6e7d68d11252538033e73cc5ad0fa4187507d510606cc2151ef77bdd.dll
-
Size
284KB
-
MD5
254e25d9c245c1c31195abf07c33ace8
-
SHA1
abb2f7c53bdba666327ca57e84858b0f2d06b32f
-
SHA256
009a1e1a6e7d68d11252538033e73cc5ad0fa4187507d510606cc2151ef77bdd
-
SHA512
2505dff96fb1ef123d865e027a163be1535d918d07145c0f27b8881c235ebf66d3d40bd8f7d10eaa9288aa8a70eb70238ee34cdd514c4f6bd87a84d7b177c909
-
SSDEEP
3072:PyMOh3r78V+l1zYJ6c5ya6by1VwEgvI1S9eWHfkq6VEf2h0xqE:PKr78fsGyhv6iDSVEf28/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5092 wrote to memory of 4228 5092 rundll32.exe 83 PID 5092 wrote to memory of 4228 5092 rundll32.exe 83 PID 5092 wrote to memory of 4228 5092 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\009a1e1a6e7d68d11252538033e73cc5ad0fa4187507d510606cc2151ef77bdd.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\009a1e1a6e7d68d11252538033e73cc5ad0fa4187507d510606cc2151ef77bdd.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4228
-