Analysis
-
max time kernel
93s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-01-2025 08:44
Behavioral task
behavioral1
Sample
d8d605c166e335df913a9dc042f0ad157c1b88928413079e20b491cb0721961f.dll
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
d8d605c166e335df913a9dc042f0ad157c1b88928413079e20b491cb0721961f.dll
Resource
win10v2004-20241007-en
General
-
Target
d8d605c166e335df913a9dc042f0ad157c1b88928413079e20b491cb0721961f.dll
-
Size
329KB
-
MD5
c19c35f33b6124c71d6cb349f39db2f3
-
SHA1
8f52120b106dc602a099aa88990806fd15e53f1f
-
SHA256
d8d605c166e335df913a9dc042f0ad157c1b88928413079e20b491cb0721961f
-
SHA512
2a2acfb3d5d129f1996eab75d9afb70411cb23262cf833ffb28d2af0a0eff035b1ef65a5f2ffec1e496ad77f259c6861b4168dc47257368d79297749367bd60c
-
SSDEEP
6144:RmWhxR1arY/PbgmFOabPIIBhJXAv7eTY9suz0xhttGSrDKE3KIvSka8bi:RmWTR1arYnEKosuzY34CZ3DvSkN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4572 wrote to memory of 4052 4572 rundll32.exe 82 PID 4572 wrote to memory of 4052 4572 rundll32.exe 82 PID 4572 wrote to memory of 4052 4572 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d8d605c166e335df913a9dc042f0ad157c1b88928413079e20b491cb0721961f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d8d605c166e335df913a9dc042f0ad157c1b88928413079e20b491cb0721961f.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4052
-