Analysis

  • max time kernel
    129s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-07-2024 13:19

General

  • Target

    GrdVkc32.dll

  • Size

    3.6MB

  • MD5

    3fa3fc0a2599b3a161c5a492688d2420

  • SHA1

    b02c2464079b5c7ce4e880f2f44ae98e1a46d63f

  • SHA256

    b8585933da98e3f58b1f083fb7735d52146076ab9739da6c20dffa0ba686d973

  • SHA512

    cd50fa2bfb99129abdbb17a88bdc3875f2d2950accb098b445f9227af50d980d617157ba0b1e4c3f6b491501e9f30b01ee33db48e9f2bc30c23261f40753109c

  • SSDEEP

    49152:IpkLME1oE1FJs1f2tQAz9k5F8NwdREZ1613XoExXe28Qb1RIF2UL4:1h1oEbJs1f2txz9WWGRELAXooXe2v/z

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\GrdVkc32.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4032
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\GrdVkc32.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2000
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 584
        3⤵
        • Program crash
        PID:1084
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2000 -ip 2000
    1⤵
      PID:3584

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2000-0-0x0000000010000000-0x00000000103AE000-memory.dmp

      Filesize

      3.7MB

    • memory/2000-1-0x00000000101B8000-0x0000000010242000-memory.dmp

      Filesize

      552KB

    • memory/2000-2-0x0000000010000000-0x00000000103AE000-memory.dmp

      Filesize

      3.7MB