Analysis
-
max time kernel
93s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27-06-2024 07:33
Static task
static1
Behavioral task
behavioral1
Sample
09000000000000009.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
09000000000000009.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
7g26jn92p7b.dll
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
7g26jn92p7b.dll
Resource
win10v2004-20240508-en
General
-
Target
7g26jn92p7b.dll
-
Size
14KB
-
MD5
d4cd2de76cb5e3926b6ebbdb5d421490
-
SHA1
9ba8904ab672d5761ff95c7db07ca249d000b0d0
-
SHA256
4feb8ae08b605e9cd75f5a999c59cdb5b5ddc5dd6932b018ba0a4fa5ef6dd1d5
-
SHA512
7acb5f7d6d204779ed5c232d8e5fc01cd7312f59631a68bd10944b221f3e45b573cefa61e236d977ce623e9d99f3ed3c5b64a8086cc6c30bd648eaabc36126e5
-
SSDEEP
192:5zfMvg35JT5CQuF9RFNDaSL6SwcuULPYABqo011nzxwSlTgMMXioI:5fM8JiF9RfaSL6SwuYV1FxwSJ9
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\name = "C:\\Users\\Admin\\AppData\\Roaming\\folder\\file.exe" rundll32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1448 4932 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
rundll32.exepid process 4932 rundll32.exe 4932 rundll32.exe 4932 rundll32.exe 4932 rundll32.exe 4932 rundll32.exe 4932 rundll32.exe 4932 rundll32.exe 4932 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4884 wrote to memory of 4932 4884 rundll32.exe rundll32.exe PID 4884 wrote to memory of 4932 4884 rundll32.exe rundll32.exe PID 4884 wrote to memory of 4932 4884 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7g26jn92p7b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7g26jn92p7b.dll,#12⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:4932 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4932 -s 7323⤵
- Program crash
PID:1448
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4932 -ip 49321⤵PID:3540