Analysis
-
max time kernel
104s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-08-2024 17:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6ddffd60e8c6f0e4f935b311ad8449b0N.dll
Resource
win10v2004-20240802-en
windows10-2004-x64
3 signatures
120 seconds
General
-
Target
6ddffd60e8c6f0e4f935b311ad8449b0N.dll
-
Size
242KB
-
MD5
6ddffd60e8c6f0e4f935b311ad8449b0
-
SHA1
5c5b6f504d6562946afaa463acab4420e770257c
-
SHA256
9df4f06e78570302f4f67677d70a47e963e99aaac10ec41178e4542032820ba7
-
SHA512
e07403c0e55435f06a8c68119662345462572eb45a6e4a8e4f0ccd217c1fe7bc1bb973d0312f49dfa5b840d06d2db191ce749a86b4e15348764b411d6b7b978f
-
SSDEEP
6144:eF7lrqGjG5ONvskbODoKRmEXEihpqfnM:eFJrzGsNUZ8K4Ey/
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1828 4736 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2724 wrote to memory of 4736 2724 rundll32.exe 84 PID 2724 wrote to memory of 4736 2724 rundll32.exe 84 PID 2724 wrote to memory of 4736 2724 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6ddffd60e8c6f0e4f935b311ad8449b0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6ddffd60e8c6f0e4f935b311ad8449b0N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 6683⤵
- Program crash
PID:1828
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4736 -ip 47361⤵PID:1332