Analysis
-
max time kernel
29s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06/08/2024, 23:20
Static task
static1
Behavioral task
behavioral1
Sample
751f149665f87dd20cc8dff743f28e5da1ff2a5f04874d4b8569b9afceeedfec.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
751f149665f87dd20cc8dff743f28e5da1ff2a5f04874d4b8569b9afceeedfec.dll
Resource
win10v2004-20240802-en
General
-
Target
751f149665f87dd20cc8dff743f28e5da1ff2a5f04874d4b8569b9afceeedfec.dll
-
Size
6.0MB
-
MD5
573baaf10e2cd69e7749e8d65c5adabf
-
SHA1
2879aae0d563b38b564c0c8905788fcf8c3e4b70
-
SHA256
751f149665f87dd20cc8dff743f28e5da1ff2a5f04874d4b8569b9afceeedfec
-
SHA512
79c7f3fd34225d5c0eceb2278676272f731f72bd0e632a080073993ebbad1c813df3a4ea5e63490b7844159bd36ca2855b6aca1242a2091327bcc5e9aa414434
-
SSDEEP
49152:JErEyCal8VnN+LwbEOCAQFhZ81wm+R9BlwxPJfkwDQby1uZLOkALP7fivHdHufrd:JElCQ8VN+TAghZbR9y6wKyskkk2HO
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\*ChromeUpdate = "rundll32.exe C:\\Users\\Admin\\Documents\\FirefoxData.dll,EntryPoint" reg.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1952 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3060 592 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2488 wrote to memory of 1952 2488 rundll32.exe 28 PID 2488 wrote to memory of 1952 2488 rundll32.exe 28 PID 2488 wrote to memory of 1952 2488 rundll32.exe 28 PID 2488 wrote to memory of 1952 2488 rundll32.exe 28 PID 2488 wrote to memory of 1952 2488 rundll32.exe 28 PID 2488 wrote to memory of 1952 2488 rundll32.exe 28 PID 2488 wrote to memory of 1952 2488 rundll32.exe 28 PID 1952 wrote to memory of 592 1952 rundll32.exe 29 PID 1952 wrote to memory of 592 1952 rundll32.exe 29 PID 1952 wrote to memory of 592 1952 rundll32.exe 29 PID 1952 wrote to memory of 592 1952 rundll32.exe 29 PID 1952 wrote to memory of 592 1952 rundll32.exe 29 PID 1952 wrote to memory of 592 1952 rundll32.exe 29 PID 1952 wrote to memory of 592 1952 rundll32.exe 29 PID 1952 wrote to memory of 592 1952 rundll32.exe 29 PID 1952 wrote to memory of 592 1952 rundll32.exe 29 PID 1952 wrote to memory of 592 1952 rundll32.exe 29 PID 592 wrote to memory of 3060 592 rundll32.exe 30 PID 592 wrote to memory of 3060 592 rundll32.exe 30 PID 592 wrote to memory of 3060 592 rundll32.exe 30 PID 592 wrote to memory of 3060 592 rundll32.exe 30 PID 1952 wrote to memory of 2752 1952 rundll32.exe 31 PID 1952 wrote to memory of 2752 1952 rundll32.exe 31 PID 1952 wrote to memory of 2752 1952 rundll32.exe 31 PID 1952 wrote to memory of 2752 1952 rundll32.exe 31 PID 2752 wrote to memory of 2668 2752 cmd.exe 33 PID 2752 wrote to memory of 2668 2752 cmd.exe 33 PID 2752 wrote to memory of 2668 2752 cmd.exe 33 PID 2752 wrote to memory of 2668 2752 cmd.exe 33
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\751f149665f87dd20cc8dff743f28e5da1ff2a5f04874d4b8569b9afceeedfec.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\751f149665f87dd20cc8dff743f28e5da1ff2a5f04874d4b8569b9afceeedfec.dll,#12⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 592 -s 1964⤵
- Program crash
PID:3060
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "*ChromeUpdate" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\FirefoxData.dll",EntryPoint /f & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "*ChromeUpdate" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\FirefoxData.dll",EntryPoint /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2668
-
-
-