Analysis
-
max time kernel
90s -
max time network
92s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 00:10
Static task
static1
Behavioral task
behavioral1
Sample
9c39be8c9c6a1f73d3c373c15dd577b5e6d7455a3b61c52584747ec55f50c62bN.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9c39be8c9c6a1f73d3c373c15dd577b5e6d7455a3b61c52584747ec55f50c62bN.dll
Resource
win10v2004-20241007-en
General
-
Target
9c39be8c9c6a1f73d3c373c15dd577b5e6d7455a3b61c52584747ec55f50c62bN.dll
-
Size
6KB
-
MD5
8e164e480c539b2522c6506d978d2680
-
SHA1
e7337a83cb3c14565b792873c2194b981868bd24
-
SHA256
9c39be8c9c6a1f73d3c373c15dd577b5e6d7455a3b61c52584747ec55f50c62b
-
SHA512
95451da1f634794e78a2bd6315fa5067b3248fbbc6863acd2750680625bd375fa98045b86e6a50238ca951b948b0ee3b568b426e549bae140bc20703cd562a20
-
SSDEEP
96:hy859x0P8Majrx4vlgHd9wTUzSSDyZgN:F5oLcF4JTWFDL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4284 wrote to memory of 3020 4284 rundll32.exe 85 PID 4284 wrote to memory of 3020 4284 rundll32.exe 85 PID 4284 wrote to memory of 3020 4284 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9c39be8c9c6a1f73d3c373c15dd577b5e6d7455a3b61c52584747ec55f50c62bN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9c39be8c9c6a1f73d3c373c15dd577b5e6d7455a3b61c52584747ec55f50c62bN.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3020
-