Analysis
-
max time kernel
91s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 03:07
Static task
static1
Behavioral task
behavioral1
Sample
a178c7f53deb11679dba38d69eb1625e4eba89c06136bedb2d1f0a77f2e9ccb5.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a178c7f53deb11679dba38d69eb1625e4eba89c06136bedb2d1f0a77f2e9ccb5.dll
Resource
win10v2004-20241007-en
General
-
Target
a178c7f53deb11679dba38d69eb1625e4eba89c06136bedb2d1f0a77f2e9ccb5.dll
-
Size
5KB
-
MD5
847306586bf977ca151177c3707fd3e0
-
SHA1
1e61fbc118c7349547e637be096d2a9182f2b749
-
SHA256
a178c7f53deb11679dba38d69eb1625e4eba89c06136bedb2d1f0a77f2e9ccb5
-
SHA512
3e68764180177b93c316265bbeddb1a5bce8ac41411def7c33f87e606eabc577d509baa9822d42d527095757c1e790f29a05573fbb36a8e057f889e024fcda6f
-
SSDEEP
96:hy859x0P8MaH/UuwU2mdIYrvqlRKvzVA+:F5oL4/UuwU2mdIY2lRK77
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 800 wrote to memory of 2112 800 rundll32.exe 83 PID 800 wrote to memory of 2112 800 rundll32.exe 83 PID 800 wrote to memory of 2112 800 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a178c7f53deb11679dba38d69eb1625e4eba89c06136bedb2d1f0a77f2e9ccb5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a178c7f53deb11679dba38d69eb1625e4eba89c06136bedb2d1f0a77f2e9ccb5.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2112
-