Analysis
-
max time kernel
93s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2024 02:11
Behavioral task
behavioral1
Sample
08be0ce7f2d832f5c1a6243698f84bf9ad4ae2d96dce4e24e2f671d4ce452409N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
08be0ce7f2d832f5c1a6243698f84bf9ad4ae2d96dce4e24e2f671d4ce452409N.dll
Resource
win10v2004-20241007-en
General
-
Target
08be0ce7f2d832f5c1a6243698f84bf9ad4ae2d96dce4e24e2f671d4ce452409N.dll
-
Size
327KB
-
MD5
aca6dbf336ec6608999a54258b39b990
-
SHA1
5edf11d77e1dc5d3772aa0f9e6395ea3673b334e
-
SHA256
08be0ce7f2d832f5c1a6243698f84bf9ad4ae2d96dce4e24e2f671d4ce452409
-
SHA512
79267dfb1efa0a92578e62d791eaabf19655976e2f348c03f47dc86bc4a51d53079508a082b46c0233396ae7616a00af9e433a27c18dbee513af35d67b28c921
-
SSDEEP
6144:EmWPDNND9yRPzLq+YXFqaZiMLic9kzVd7EAC48Ss9Ei:EmWhND9yJz+b1FcMLmp2AT8Ssd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3644 wrote to memory of 4956 3644 rundll32.exe 82 PID 3644 wrote to memory of 4956 3644 rundll32.exe 82 PID 3644 wrote to memory of 4956 3644 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\08be0ce7f2d832f5c1a6243698f84bf9ad4ae2d96dce4e24e2f671d4ce452409N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\08be0ce7f2d832f5c1a6243698f84bf9ad4ae2d96dce4e24e2f671d4ce452409N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4956
-