Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 19:17
Static task
static1
Behavioral task
behavioral1
Sample
4.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral3
Sample
EduWebContainer.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
EduWebContainer.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral5
Sample
msvcp140.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
msvcp140.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral7
Sample
vcruntime140.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
vcruntime140.dll
Resource
win10v2004-20240730-en
General
-
Target
msvcp140.dll
-
Size
429KB
-
MD5
cfbdf284c12056347e6773cb3949fbba
-
SHA1
ad3fa5fbbc4296d4a901ea94460762faf3d6a2b8
-
SHA256
bbecdfda2551b01aa16005c88305982c360a9fb9ba3d9be2fb15f2e9c6eb809f
-
SHA512
2f24eac94d51f8f28c8e6b6234ca2e481e0f8f1a73df62766ff4f5640480377fb2c4a469babedb87d303503994b469e570aaf725e16da6f9b2d6a77f15b4623f
-
SSDEEP
12288:lTLNQjAM80l7Vpm8j2NoSpman+hUgiW6QR7t5s03Ooc8dHkC2esumPy:lTLNQcMmYpE903Ooc8dHkC2enm6
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3004 3008 WerFault.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1892 wrote to memory of 3008 1892 rundll32.exe rundll32.exe PID 1892 wrote to memory of 3008 1892 rundll32.exe rundll32.exe PID 1892 wrote to memory of 3008 1892 rundll32.exe rundll32.exe PID 1892 wrote to memory of 3008 1892 rundll32.exe rundll32.exe PID 1892 wrote to memory of 3008 1892 rundll32.exe rundll32.exe PID 1892 wrote to memory of 3008 1892 rundll32.exe rundll32.exe PID 1892 wrote to memory of 3008 1892 rundll32.exe rundll32.exe PID 3008 wrote to memory of 3004 3008 rundll32.exe WerFault.exe PID 3008 wrote to memory of 3004 3008 rundll32.exe WerFault.exe PID 3008 wrote to memory of 3004 3008 rundll32.exe WerFault.exe PID 3008 wrote to memory of 3004 3008 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\msvcp140.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\msvcp140.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3008 -s 2203⤵
- Program crash
PID:3004
-
-