Analysis
-
max time kernel
94s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:14
Static task
static1
Behavioral task
behavioral1
Sample
eb63e2d7bef51b17039d6a779e349879932bd81ff2736f08f78f1d1d048b1058.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb63e2d7bef51b17039d6a779e349879932bd81ff2736f08f78f1d1d048b1058.dll
Resource
win10v2004-20241007-en
General
-
Target
eb63e2d7bef51b17039d6a779e349879932bd81ff2736f08f78f1d1d048b1058.dll
-
Size
6KB
-
MD5
3d3895d8f691f66b94fe5b1126d1b1e6
-
SHA1
1698c1f753af0077d56e61ce280fa9cffe684fa3
-
SHA256
eb63e2d7bef51b17039d6a779e349879932bd81ff2736f08f78f1d1d048b1058
-
SHA512
39238ce8695ede7da4a4c02f1625047e50b3847d7fbe1ed5a6ec42c9e16ddf599099c743b5c348dfe1c345afc1834db86d754fff35ce69beefdd2849f5e8fecf
-
SSDEEP
192:JR94/b+MCKcmcpppCqpp/hLihhhoaUpy01:dK+MC7pppZpp3aUpP1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4024 wrote to memory of 3556 4024 rundll32.exe 83 PID 4024 wrote to memory of 3556 4024 rundll32.exe 83 PID 4024 wrote to memory of 3556 4024 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eb63e2d7bef51b17039d6a779e349879932bd81ff2736f08f78f1d1d048b1058.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eb63e2d7bef51b17039d6a779e349879932bd81ff2736f08f78f1d1d048b1058.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3556
-