Analysis
-
max time kernel
96s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2024 22:05
Behavioral task
behavioral1
Sample
466d0e643397ab0ecb71c4c69853d68ac06278cf01f17260de79036fff6ececf.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
466d0e643397ab0ecb71c4c69853d68ac06278cf01f17260de79036fff6ececf.dll
Resource
win10v2004-20241007-en
General
-
Target
466d0e643397ab0ecb71c4c69853d68ac06278cf01f17260de79036fff6ececf.dll
-
Size
143KB
-
MD5
2261618bf774968326f9d5466216a873
-
SHA1
710eae50692a5c0e8858134f79c315f100fa7ba4
-
SHA256
466d0e643397ab0ecb71c4c69853d68ac06278cf01f17260de79036fff6ececf
-
SHA512
6398f9776313982d04c7c014c3361d08375a55de006481bf9b86bdb8c9b9d58643bff413d20d36eff8d4d751471b1f6c05bf97ec5548ef46ec9391b7df9171e9
-
SSDEEP
3072:gbz5xHll9NHM8mQFA3S4PWRaQtKhkDxBJn:gf5xFl9NNmQa3HCmaX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4528 wrote to memory of 4272 4528 rundll32.exe 83 PID 4528 wrote to memory of 4272 4528 rundll32.exe 83 PID 4528 wrote to memory of 4272 4528 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\466d0e643397ab0ecb71c4c69853d68ac06278cf01f17260de79036fff6ececf.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\466d0e643397ab0ecb71c4c69853d68ac06278cf01f17260de79036fff6ececf.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4272
-