Analysis
-
max time kernel
95s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 03:41
Static task
static1
Behavioral task
behavioral1
Sample
8cb0ead64d294a33d3fa1ee93b8167266166af802a4c49ee8c6a8f5ab13d9232.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8cb0ead64d294a33d3fa1ee93b8167266166af802a4c49ee8c6a8f5ab13d9232.dll
Resource
win10v2004-20241007-en
General
-
Target
8cb0ead64d294a33d3fa1ee93b8167266166af802a4c49ee8c6a8f5ab13d9232.dll
-
Size
43KB
-
MD5
ccf22e6beda3495e987fb4106e68f8ca
-
SHA1
fd356dc274b4f23b761af74f050d80d9f684354e
-
SHA256
8cb0ead64d294a33d3fa1ee93b8167266166af802a4c49ee8c6a8f5ab13d9232
-
SHA512
15346df4229b729b7cef0c3f5e3edcddfacd1702fe8e0bd303ba664d9413fbbc650ce8ef69d3703fd22bc4c570af9a1bef832a1f4b7c86a4111eb6b06f909761
-
SSDEEP
384:8y5JZSiyCSiy2yRAYiTvaK3QcNyb8E9VF6IYinAM+oP9owVo:5yCYGiK3Q8EpYinAMxY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1732 wrote to memory of 1460 1732 rundll32.exe 83 PID 1732 wrote to memory of 1460 1732 rundll32.exe 83 PID 1732 wrote to memory of 1460 1732 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8cb0ead64d294a33d3fa1ee93b8167266166af802a4c49ee8c6a8f5ab13d9232.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8cb0ead64d294a33d3fa1ee93b8167266166af802a4c49ee8c6a8f5ab13d9232.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1460
-