Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2025 10:52
Behavioral task
behavioral1
Sample
0f9d64e6b99e024542248fa7a9b53836c890ef2a641e2a0c425bef3d5115c657N.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
0f9d64e6b99e024542248fa7a9b53836c890ef2a641e2a0c425bef3d5115c657N.dll
Resource
win10v2004-20241007-en
General
-
Target
0f9d64e6b99e024542248fa7a9b53836c890ef2a641e2a0c425bef3d5115c657N.dll
-
Size
317KB
-
MD5
46207c2b537ebef2e708db98c85e9f70
-
SHA1
118145e743966af635a2fecff60f329c5bdff3ee
-
SHA256
0f9d64e6b99e024542248fa7a9b53836c890ef2a641e2a0c425bef3d5115c657
-
SHA512
5bd20ec98fc677c58567bfee90ee4b593537c8cd0986bb755572a2f9971984cdc45b2f428623f97704f54eb01faac8eb824a9ef381f5e95f0cbba880499d22ec
-
SSDEEP
6144:zmWoza0a1IMVVEb3uqRpwIUV9lMYmFQqZRRphLuVucfb8ehbjN8wS21bKRTw4f3G:zmWQa0a1IMVr9eMqbRzLuVucfb8ehbjH
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4292 wrote to memory of 3860 4292 rundll32.exe 82 PID 4292 wrote to memory of 3860 4292 rundll32.exe 82 PID 4292 wrote to memory of 3860 4292 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0f9d64e6b99e024542248fa7a9b53836c890ef2a641e2a0c425bef3d5115c657N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0f9d64e6b99e024542248fa7a9b53836c890ef2a641e2a0c425bef3d5115c657N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3860
-