Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 07:43
Behavioral task
behavioral1
Sample
48ea5e515c8312a092bc9add51210374e550e97208325194386361eeb3ee6bf4N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
48ea5e515c8312a092bc9add51210374e550e97208325194386361eeb3ee6bf4N.dll
Resource
win10v2004-20241007-en
General
-
Target
48ea5e515c8312a092bc9add51210374e550e97208325194386361eeb3ee6bf4N.dll
-
Size
327KB
-
MD5
eab23afe36eabbb74041927818ad3f60
-
SHA1
9c8a491c517b6135b21c83a9154138d1e17170ef
-
SHA256
48ea5e515c8312a092bc9add51210374e550e97208325194386361eeb3ee6bf4
-
SHA512
1584fdc5f8e6e7accdf7b2812c79415c11b7ffc5eb2c85a0da1f5e51367039e979ed9229e4b31bd3e7978581414809ccd824ff9688c66d35da5c993caf9a75f5
-
SSDEEP
6144:EmWPDNND9yRPzLq+YXFqaZiMLic9kzVd7EAC48Ss9Ei:EmWhND9yJz+b1FcMLmp2AT8Ssd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3204 wrote to memory of 2920 3204 rundll32.exe 83 PID 3204 wrote to memory of 2920 3204 rundll32.exe 83 PID 3204 wrote to memory of 2920 3204 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\48ea5e515c8312a092bc9add51210374e550e97208325194386361eeb3ee6bf4N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\48ea5e515c8312a092bc9add51210374e550e97208325194386361eeb3ee6bf4N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2920
-