Analysis

  • max time kernel
    106s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-07-2024 11:31

General

  • Target

    wrapper.dll

  • Size

    655KB

  • MD5

    e1656d25f53820e291e60093f8e8bc41

  • SHA1

    1407ef55c30de78b3b5f3e4a0042281ae9d55831

  • SHA256

    367fda11631296caef0acad26cfed7d0934475eacb8349c1c209a575bf547cb8

  • SHA512

    5407d8605a1405759f824e10bd748671d057eb477b8feed5772e62fa55f67df10ed643a7a7f90562db3782461291b61b452d679453888d065e0c8bafb8791e7f

  • SSDEEP

    12288:3lTILolEZuvuVJBK9ONOkx2PAUv0vWPdcef6WKqC1bBTzBS0ncQ:3lTI9nhOkUIM0qNf6WKNJB1cQ

Score
7/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\wrapper.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4632
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\wrapper.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:2800
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2800 -s 700
        3⤵
        • Program crash
        PID:1672
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2800 -ip 2800
    1⤵
      PID:1168

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2800-0-0x0000000010000000-0x000000001017D000-memory.dmp

      Filesize

      1.5MB

    • memory/2800-1-0x0000000002D50000-0x0000000002F09000-memory.dmp

      Filesize

      1.7MB

    • memory/2800-3-0x00000000032A0000-0x00000000033A0000-memory.dmp

      Filesize

      1024KB

    • memory/2800-11-0x0000000003080000-0x00000000030B5000-memory.dmp

      Filesize

      212KB

    • memory/2800-10-0x00000000032F0000-0x00000000032F1000-memory.dmp

      Filesize

      4KB

    • memory/2800-9-0x00000000032A0000-0x00000000032A5000-memory.dmp

      Filesize

      20KB

    • memory/2800-8-0x00000000032A0000-0x00000000032A1000-memory.dmp

      Filesize

      4KB

    • memory/2800-7-0x00000000032A0000-0x00000000032A1000-memory.dmp

      Filesize

      4KB

    • memory/2800-6-0x00000000032A0000-0x00000000032A1000-memory.dmp

      Filesize

      4KB

    • memory/2800-5-0x00000000032A0000-0x00000000033A0000-memory.dmp

      Filesize

      1024KB

    • memory/2800-4-0x00000000032A0000-0x00000000033A0000-memory.dmp

      Filesize

      1024KB

    • memory/2800-2-0x0000000002D50000-0x0000000002F09000-memory.dmp

      Filesize

      1.7MB

    • memory/2800-18-0x00000000032C0000-0x00000000032C1000-memory.dmp

      Filesize

      4KB

    • memory/2800-17-0x0000000003020000-0x0000000003021000-memory.dmp

      Filesize

      4KB

    • memory/2800-16-0x0000000003010000-0x0000000003011000-memory.dmp

      Filesize

      4KB

    • memory/2800-15-0x00000000032B0000-0x00000000032B1000-memory.dmp

      Filesize

      4KB

    • memory/2800-14-0x0000000003290000-0x0000000003291000-memory.dmp

      Filesize

      4KB

    • memory/2800-13-0x00000000032F0000-0x00000000032F1000-memory.dmp

      Filesize

      4KB

    • memory/2800-12-0x0000000003300000-0x0000000003301000-memory.dmp

      Filesize

      4KB

    • memory/2800-21-0x0000000003080000-0x00000000030B5000-memory.dmp

      Filesize

      212KB

    • memory/2800-22-0x0000000002D50000-0x0000000002F09000-memory.dmp

      Filesize

      1.7MB

    • memory/2800-19-0x0000000010000000-0x000000001017D000-memory.dmp

      Filesize

      1.5MB