Analysis
-
max time kernel
16s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 17:50
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
SmokeAPI32.dll
Resource
win7-20240705-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
SmokeAPI32.dll
Resource
win10v2004-20240709-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
SmokeAPI32.dll
-
Size
2.6MB
-
MD5
4a1a823e5cf4fb861dd6ba94539d29c4
-
SHA1
8e2f160783e159fdd33e806acbc5afb37f84ec4d
-
SHA256
f874fa379dc8557f5d640a17753900a7c1a1d5f93a13aeeef176316b8ccf0764
-
SHA512
018768c3dbee58ce5c42d00577160ab9766284200c37a173c0fb711c82db6ea6d8e7a80a66e0be5afe853dd8ab07a378db25dea0de0b6adc43b1fe9b7cf46e52
-
SSDEEP
49152:35vblJgUj8ujYTXhaFRCYLXILLrVCYLdRu4BvfCi1QVC:Bbjj6XcFULrVCYLDu
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2944 2364 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2364 2524 rundll32.exe 29 PID 2524 wrote to memory of 2364 2524 rundll32.exe 29 PID 2524 wrote to memory of 2364 2524 rundll32.exe 29 PID 2524 wrote to memory of 2364 2524 rundll32.exe 29 PID 2524 wrote to memory of 2364 2524 rundll32.exe 29 PID 2524 wrote to memory of 2364 2524 rundll32.exe 29 PID 2524 wrote to memory of 2364 2524 rundll32.exe 29 PID 2364 wrote to memory of 2944 2364 rundll32.exe 30 PID 2364 wrote to memory of 2944 2364 rundll32.exe 30 PID 2364 wrote to memory of 2944 2364 rundll32.exe 30 PID 2364 wrote to memory of 2944 2364 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\SmokeAPI32.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\SmokeAPI32.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2364 -s 2563⤵
- Program crash
PID:2944
-
-