Analysis
-
max time kernel
95s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 06:34
Static task
static1
Behavioral task
behavioral1
Sample
16de507ba62a6c9af3e07ad1f188ba05f9750fc534960b4635ea1550492d542d.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
16de507ba62a6c9af3e07ad1f188ba05f9750fc534960b4635ea1550492d542d.dll
Resource
win10v2004-20241007-en
General
-
Target
16de507ba62a6c9af3e07ad1f188ba05f9750fc534960b4635ea1550492d542d.dll
-
Size
72KB
-
MD5
de8d052d1bbed25a1cf91c37c576c849
-
SHA1
b11eabd9e32f8864cf7ed1544d00dbdf6a52c924
-
SHA256
16de507ba62a6c9af3e07ad1f188ba05f9750fc534960b4635ea1550492d542d
-
SHA512
c608dde183555d84c84fa2251f286e0c50d773b8476f4083e03a7befec8b14c8a69403de031b5bb7b1c18f051b982a59c049e717aad2fdee7aab81a76efa474d
-
SSDEEP
1536:r/IZfphad78bsIj4ueSmkAV1c58bisNcd/:rH/A9eSk1c58mOc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4472 wrote to memory of 4672 4472 rundll32.exe 83 PID 4472 wrote to memory of 4672 4472 rundll32.exe 83 PID 4472 wrote to memory of 4672 4472 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\16de507ba62a6c9af3e07ad1f188ba05f9750fc534960b4635ea1550492d542d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\16de507ba62a6c9af3e07ad1f188ba05f9750fc534960b4635ea1550492d542d.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4672
-