Analysis
-
max time kernel
135s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2024 09:16
Behavioral task
behavioral1
Sample
f3fe367f40951e6d776af401e14d869b2a932f0ad96990acf5cbd40d97321c35.dll
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
f3fe367f40951e6d776af401e14d869b2a932f0ad96990acf5cbd40d97321c35.dll
Resource
win10v2004-20241007-en
General
-
Target
f3fe367f40951e6d776af401e14d869b2a932f0ad96990acf5cbd40d97321c35.dll
-
Size
327KB
-
MD5
25b925c558989099c4ad9f20ce1416a1
-
SHA1
66e44b27bcb102c75252fbec884ba1c46c50b2b4
-
SHA256
f3fe367f40951e6d776af401e14d869b2a932f0ad96990acf5cbd40d97321c35
-
SHA512
35ec814b745fcfc505d8c87d3b34cbc82ecd37efc9d5d58942ca17e08ecc289fda2867d3c2c073d9369860cf0a1214318619c06f134043572bff9c68f44aaf01
-
SSDEEP
6144:EmWPDNND9yRPzLq+YXFqaZiMLic9kzVd7EAC48Ss9Ei:EmWhND9yJz+b1FcMLmp2AT8Ssd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 744 wrote to memory of 2336 744 rundll32.exe 85 PID 744 wrote to memory of 2336 744 rundll32.exe 85 PID 744 wrote to memory of 2336 744 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f3fe367f40951e6d776af401e14d869b2a932f0ad96990acf5cbd40d97321c35.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f3fe367f40951e6d776af401e14d869b2a932f0ad96990acf5cbd40d97321c35.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2336
-