Analysis
-
max time kernel
104s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2025, 21:26
Behavioral task
behavioral1
Sample
45b563e43851d80182a05da5a1cff0657c75dfba3bf70803f0cf7fbe99f2c06b.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
45b563e43851d80182a05da5a1cff0657c75dfba3bf70803f0cf7fbe99f2c06b.dll
Resource
win10v2004-20250314-en
General
-
Target
45b563e43851d80182a05da5a1cff0657c75dfba3bf70803f0cf7fbe99f2c06b.dll
-
Size
36KB
-
MD5
61db25bca695a1c99c91513dd0641660
-
SHA1
99863a4ac66d1556b8e54e6e95a96af4b4f450e8
-
SHA256
45b563e43851d80182a05da5a1cff0657c75dfba3bf70803f0cf7fbe99f2c06b
-
SHA512
dca2cfe9d7a65876136b2f6bb793eb3e1cc9e2736563f7d2e21c4dde28be4c7e9a0bd77704805a4e94b7930c7846ffcfe2a50ebc2c64620e9ece608f25e52323
-
SSDEEP
768:EYZiyYcpbEzlwF2g9ap4nLBFvpzbHyV6N55IHFKSu87W78aETvqtnqUHvBrLXvb4:EYZEcKzlwb9u4nLbvpzLy0N55IHFKSuc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 976 wrote to memory of 1072 976 rundll32.exe 88 PID 976 wrote to memory of 1072 976 rundll32.exe 88 PID 976 wrote to memory of 1072 976 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\45b563e43851d80182a05da5a1cff0657c75dfba3bf70803f0cf7fbe99f2c06b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\45b563e43851d80182a05da5a1cff0657c75dfba3bf70803f0cf7fbe99f2c06b.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1072
-