Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-12-2024 23:05
Behavioral task
behavioral1
Sample
4759714d57d30a10f6d6a61a33ef221fcbb4b8d8f63348c8734063dcea158bd4.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
4759714d57d30a10f6d6a61a33ef221fcbb4b8d8f63348c8734063dcea158bd4.dll
Resource
win10v2004-20241007-en
General
-
Target
4759714d57d30a10f6d6a61a33ef221fcbb4b8d8f63348c8734063dcea158bd4.dll
-
Size
9KB
-
MD5
55ca95b290499cfeb755afb787d4f90e
-
SHA1
589ca556a2a9b8c415de7e269e4607a10a9b0e5e
-
SHA256
4759714d57d30a10f6d6a61a33ef221fcbb4b8d8f63348c8734063dcea158bd4
-
SHA512
589a3c15f0024ac6511f7fec5c6e1f4dfe12fc4a9609bd09da29dc26db5e879835fcace332e2b6454862677503a435679df14ff7ac8a470c9f11707ea41c63bb
-
SSDEEP
192:2sDfhSuEE+rOGSBfUjWJz5jOsO1I1IgAkloCQM:24SOGSBZJz5jyyAkmC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4456 wrote to memory of 4540 4456 rundll32.exe 82 PID 4456 wrote to memory of 4540 4456 rundll32.exe 82 PID 4456 wrote to memory of 4540 4456 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4759714d57d30a10f6d6a61a33ef221fcbb4b8d8f63348c8734063dcea158bd4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4759714d57d30a10f6d6a61a33ef221fcbb4b8d8f63348c8734063dcea158bd4.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4540
-