Analysis
-
max time kernel
32s -
max time network
37s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
21/11/2024, 09:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
msimg32.dll
Resource
win10ltsc2021-20241023-en
2 signatures
150 seconds
General
-
Target
msimg32.dll
-
Size
150.0MB
-
MD5
a0c6afdc5fe2d1305f0f10f2988d0550
-
SHA1
956dd405f90769611ee21135ecf6eb5a912d82ec
-
SHA256
833e7aed7d6fb23cf5a1a0af7f90c9ee7c0543e806a809839ef09a3d903e3316
-
SHA512
7a6d45e08f8f7cc6aacf76378f3e6f4bd80fcc27c0af9da76547ffda9808fd8f6a307a84edbc437fcc086aa53f3e8a2e78f950e60e454d30c4784a4731619486
-
SSDEEP
1572864:0yEWnoJnhGFJ3EJSNveMrg1VSVL51HaCBTWVLsI9BfgZhgT2p4pBid:0vYEJS8h+DZvm
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4924 wrote to memory of 556 4924 rundll32.exe 83 PID 4924 wrote to memory of 556 4924 rundll32.exe 83 PID 4924 wrote to memory of 556 4924 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\msimg32.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\msimg32.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:556
-