Analysis
-
max time kernel
93s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 03:05
Behavioral task
behavioral1
Sample
21144a0b251982b13cdd4740b96b971b697fa6adbb58d4c243c4f03381b50d7b.dll
Resource
win7-20240729-en
2 signatures
120 seconds
General
-
Target
21144a0b251982b13cdd4740b96b971b697fa6adbb58d4c243c4f03381b50d7b.dll
-
Size
73KB
-
MD5
9f8b46bf24a54f17e3b7158cdbddb24b
-
SHA1
ccc40c017cc8d8ac163a0455efa5f1e388ae9895
-
SHA256
21144a0b251982b13cdd4740b96b971b697fa6adbb58d4c243c4f03381b50d7b
-
SHA512
9251375533dbdea610750e3230a60a547390ae3909b0806e7c4f6419d4c9bdb0bec5bf94ccf885cd589780f5a2bc051d40e39100316b1e8641da85ca22b63668
-
SSDEEP
1536:MfkZMm8d1YLYfn3C/OZhWzorVTXfK4ZVql:WkZQbfn3C/OZh/BLql
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3192-0-0x0000000074000000-0x0000000074FB5000-memory.dmp vmprotect -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1968 wrote to memory of 3192 1968 rundll32.exe 83 PID 1968 wrote to memory of 3192 1968 rundll32.exe 83 PID 1968 wrote to memory of 3192 1968 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\21144a0b251982b13cdd4740b96b971b697fa6adbb58d4c243c4f03381b50d7b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\21144a0b251982b13cdd4740b96b971b697fa6adbb58d4c243c4f03381b50d7b.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3192
-