Analysis
-
max time kernel
62s -
max time network
66s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
20/11/2024, 02:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Descarga.dll
Resource
win10ltsc2021-20241023-en
2 signatures
1800 seconds
General
-
Target
Descarga.dll
-
Size
1.2MB
-
MD5
1256db0d678a86a604a61dd42da07a4a
-
SHA1
5ba1f4e06963b726e6a127f2a4caf605c94991d6
-
SHA256
2bf21a583f86c4889b1653cb188aa361a20a9fbaa451d514c4d2d8bf5decc24d
-
SHA512
294a4777fdf76e2e72fa3e544c75967797a924038139a32b79b4456dbda45e15d4d063238a65b0256b9b9393267bfefe4967b54e6a93011a05846a96ed1fcff5
-
SSDEEP
24576:XDOgwgfYbK9s3kW3CG3vQ3snpR7loatbEUZqHwhv642THJ1r63LSw7b8VzkPPjwt:XDOyfYbK9sZvw8V/qQeHf6JUawknjY
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4944 wrote to memory of 4136 4944 rundll32.exe 81 PID 4944 wrote to memory of 4136 4944 rundll32.exe 81 PID 4944 wrote to memory of 4136 4944 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Descarga.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Descarga.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4136
-