Analysis
-
max time kernel
94s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 20:35
Behavioral task
behavioral1
Sample
44163d81bb5710839fb9ba265de2c942.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
44163d81bb5710839fb9ba265de2c942.dll
Resource
win10v2004-20241007-en
General
-
Target
44163d81bb5710839fb9ba265de2c942.dll
-
Size
13KB
-
MD5
44163d81bb5710839fb9ba265de2c942
-
SHA1
a7497d6085ed8ce25e9728a0af7e989e026eaf04
-
SHA256
de4e3ff7f7da5d5561e384585a9d0cb66f2c51ea324c184848d125d8792bf666
-
SHA512
97ef4974f41affd04eb960fa873cd9754f31007c3d7239a7fb5b17cc152c01f2050c3b25d107e36ab5c65010610624e773f726de7d39255bb2c0ad5d8b9929a4
-
SSDEEP
192:4BNFWXEJWCx1TFZM4kUzGJjZC2363AP0HQ9M1uiTkXhMQzpaQA:4hlJRX7M48ZC2u9wWcXja
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 4 4312 rundll32.exe 5 4312 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4640 wrote to memory of 4312 4640 rundll32.exe 83 PID 4640 wrote to memory of 4312 4640 rundll32.exe 83 PID 4640 wrote to memory of 4312 4640 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\44163d81bb5710839fb9ba265de2c942.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\44163d81bb5710839fb9ba265de2c942.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:4312
-