Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 11:55
Static task
static1
Behavioral task
behavioral1
Sample
429308573be94433e1681cf06f305296a682fe320e96061a355f0f28c970871c.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
429308573be94433e1681cf06f305296a682fe320e96061a355f0f28c970871c.dll
Resource
win10v2004-20241007-en
General
-
Target
429308573be94433e1681cf06f305296a682fe320e96061a355f0f28c970871c.dll
-
Size
5.5MB
-
MD5
e679749e3821e4e32da4638b99bc2774
-
SHA1
98f9aa1b00e37994da9b44ee681259bdfed535c4
-
SHA256
429308573be94433e1681cf06f305296a682fe320e96061a355f0f28c970871c
-
SHA512
8df2fb8eca4da2057448bdfc3bb488a073d1307ba64ea3ec04011e41b9cede0001765db1f959fd49ac54ec0e12032088139d8a57424a6d9e093c3f14c86e402c
-
SSDEEP
98304:pvnoV3XhnSL1wWdBNzaAsz4+U2co7Cnr1DQY666NTzek/1pMIcMj+edDXGi:pvuXhnSL1wWDN/sM+arnx/6pgYFdDXG
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1708 wrote to memory of 392 1708 rundll32.exe 83 PID 1708 wrote to memory of 392 1708 rundll32.exe 83 PID 1708 wrote to memory of 392 1708 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\429308573be94433e1681cf06f305296a682fe320e96061a355f0f28c970871c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\429308573be94433e1681cf06f305296a682fe320e96061a355f0f28c970871c.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:392
-