Analysis
-
max time kernel
2s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/11/2024, 15:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
user32SteamFamilies.dll
Resource
win11-20241007-en
2 signatures
150 seconds
General
-
Target
user32SteamFamilies.dll
-
Size
425KB
-
MD5
4e677c27fee53437252a3b63f9447924
-
SHA1
8007216f7ce33fd9f0273d232d75fc0d8271c1ea
-
SHA256
a649252a304b5cdf9d4d9e222a8220bab7c8478a8e7949044d03e0904298ed36
-
SHA512
d2b29372d5a6d82c27035beb5ecfcf75fab3b449b04ed13703424f2c7f834424941914e6014b77cf498626c850f08dfd53672ee035ca01bcb07bf6c97bbd0e95
-
SSDEEP
6144:OtvGAzkd7Rr4lfWR2UyeQGpmeXflTbxNbKV5GVUuhEl4ILprMzHYs2D/dvtnA5lm:8A3jrQuILxns2D/XDVtyfu
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4304 wrote to memory of 2140 4304 rundll32.exe 77 PID 4304 wrote to memory of 2140 4304 rundll32.exe 77 PID 4304 wrote to memory of 2140 4304 rundll32.exe 77
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\user32SteamFamilies.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\user32SteamFamilies.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2140
-