Analysis
-
max time kernel
96s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 04:44
Static task
static1
Behavioral task
behavioral1
Sample
37cec897b2a814c693bfd1a13cd1218e60b573558e6d09c96f3b01cce3d8d33a.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
37cec897b2a814c693bfd1a13cd1218e60b573558e6d09c96f3b01cce3d8d33a.dll
Resource
win10v2004-20241007-en
General
-
Target
37cec897b2a814c693bfd1a13cd1218e60b573558e6d09c96f3b01cce3d8d33a.dll
-
Size
99KB
-
MD5
6beee8893fb8c06a9f690bf58fc2e460
-
SHA1
2d3965d6989ef76f53a3629c73d8fdb4e607df82
-
SHA256
37cec897b2a814c693bfd1a13cd1218e60b573558e6d09c96f3b01cce3d8d33a
-
SHA512
c2b40eb16f2981d54b7e1f89ccf88332ba8d9a6d74eac633e5dea26d37e223405cb7cc3c2fa73f642bc43d24b43c85a6ef430c95f26839ce60f32cb44ba53533
-
SSDEEP
1536:u/lB6/jF8fxUr2qyEFcpMvnvG0M6KWqJnAwaM46HU8koyKvqVtFuG8GVD28u:yn6/0gyE8406PoxHUtomS8u
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2476 wrote to memory of 3788 2476 rundll32.exe 83 PID 2476 wrote to memory of 3788 2476 rundll32.exe 83 PID 2476 wrote to memory of 3788 2476 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\37cec897b2a814c693bfd1a13cd1218e60b573558e6d09c96f3b01cce3d8d33a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\37cec897b2a814c693bfd1a13cd1218e60b573558e6d09c96f3b01cce3d8d33a.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3788
-