Analysis
-
max time kernel
93s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 01:29
Static task
static1
Behavioral task
behavioral1
Sample
1c07aa36218573dd44cc804a87a0dbe3ddac26e6da47a11184fc1711b5fb97c6N.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1c07aa36218573dd44cc804a87a0dbe3ddac26e6da47a11184fc1711b5fb97c6N.dll
Resource
win10v2004-20241007-en
General
-
Target
1c07aa36218573dd44cc804a87a0dbe3ddac26e6da47a11184fc1711b5fb97c6N.dll
-
Size
3KB
-
MD5
0154f1757577c4695892a0ec0a6bf6a0
-
SHA1
ddf602b743168e594275f1a78862ba9422999e74
-
SHA256
1c07aa36218573dd44cc804a87a0dbe3ddac26e6da47a11184fc1711b5fb97c6
-
SHA512
3a3d29c75b3bfbd33dde2c600a23a1128827113026706db0fc3ae318f63842716562156a414de9044356424261d1794ada660d6f0cdd1af91a53248fc8a20871
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3780 wrote to memory of 2620 3780 rundll32.exe rundll32.exe PID 3780 wrote to memory of 2620 3780 rundll32.exe rundll32.exe PID 3780 wrote to memory of 2620 3780 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1c07aa36218573dd44cc804a87a0dbe3ddac26e6da47a11184fc1711b5fb97c6N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1c07aa36218573dd44cc804a87a0dbe3ddac26e6da47a11184fc1711b5fb97c6N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2620
-