Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-04-2024 09:36
Static task
static1
Behavioral task
behavioral1
Sample
Funktionsomraadernes.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Funktionsomraadernes.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240419-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240419-en
General
-
Target
$PLUGINSDIR/LangDLL.dll
-
Size
5KB
-
MD5
ebd0da54db9f12ffd15206cc24355793
-
SHA1
910be3bebdde55eb1ce05915a79f01ebdc622786
-
SHA256
4066a0cbd9f6bb13c0f6fb064d4647ef7bc68a1be3d0caa4460b5ffd9ed1e0e6
-
SHA512
cee09db96267b1a30477ff074988606bdf35f9a5aa798a9a10029b11c0c347ab42a124320d777acde458828954cc8cf1a489b1673b31d589cdc4f50d4b86659d
-
SSDEEP
48:im1wsjq8W2MPUptuMMFvx/om/ycNSCwVGfOY0vB6/JvR0J9of5d2D:F18Bl91Z7/ycNSCwV8TLZR0ed2
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2668 1432 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1284 wrote to memory of 1432 1284 rundll32.exe 28 PID 1284 wrote to memory of 1432 1284 rundll32.exe 28 PID 1284 wrote to memory of 1432 1284 rundll32.exe 28 PID 1284 wrote to memory of 1432 1284 rundll32.exe 28 PID 1284 wrote to memory of 1432 1284 rundll32.exe 28 PID 1284 wrote to memory of 1432 1284 rundll32.exe 28 PID 1284 wrote to memory of 1432 1284 rundll32.exe 28 PID 1432 wrote to memory of 2668 1432 rundll32.exe 29 PID 1432 wrote to memory of 2668 1432 rundll32.exe 29 PID 1432 wrote to memory of 2668 1432 rundll32.exe 29 PID 1432 wrote to memory of 2668 1432 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\LangDLL.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\LangDLL.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1432 -s 2283⤵
- Program crash
PID:2668
-
-