Analysis
-
max time kernel
146s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 03:51
Static task
static1
Behavioral task
behavioral1
Sample
Payment Advice____xlsx.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Payment Advice____xlsx.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
vynl0gnzsf.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
vynl0gnzsf.dll
Resource
win10v2004-20240802-en
General
-
Target
vynl0gnzsf.dll
-
Size
17KB
-
MD5
9d511fba89bde65b4e28210b010c9d77
-
SHA1
cc46b5a117ca777a723422e9c68838f8e675598f
-
SHA256
3687fab11f377acc4d63b693a02ab21d14c22911f289b3ad8b19011400adc758
-
SHA512
fae30a137f093179716b780fce6ecb952abdaeeebc63745ae2cf5bd553203a252cfa5edd1c91bc31b2813dd3124c7282ae7ae706583a5bef1952cf78bcee29bb
-
SSDEEP
384:thEXpyZyASk87Xbl3JZcQ1Dq0V6xExZDGw2fLUQRGFEjpVE:H6szSDXbvZcQlqqnGw2grEj
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 216 2132 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4732 wrote to memory of 2132 4732 rundll32.exe 91 PID 4732 wrote to memory of 2132 4732 rundll32.exe 91 PID 4732 wrote to memory of 2132 4732 rundll32.exe 91
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\vynl0gnzsf.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\vynl0gnzsf.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2132 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2132 -s 7723⤵
- Program crash
PID:216
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2132 -ip 21321⤵PID:3920
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4376,i,11708048364682646792,608099842549576907,262144 --variations-seed-version --mojo-platform-channel-handle=4088 /prefetch:81⤵PID:2740