Analysis
-
max time kernel
32s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14-08-2024 19:17
Static task
static1
Behavioral task
behavioral1
Sample
223a3aa520689c0021d8ce51024d5bb0N.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
223a3aa520689c0021d8ce51024d5bb0N.dll
Resource
win10v2004-20240802-en
General
-
Target
223a3aa520689c0021d8ce51024d5bb0N.dll
-
Size
3.7MB
-
MD5
223a3aa520689c0021d8ce51024d5bb0
-
SHA1
1fbcb94006ea1b3dd1796cebe0e78fb0b9b6a874
-
SHA256
66ffa9d4e27a9f787eaa47364d57b95feae92af35ab154299c5134eacc9f4c42
-
SHA512
b329830a0b22310e4262bd071edfaf38afa199bb428dc1f99b31c83df0f699eb842e6a466d803670d5066780217e7eb966e505262c3620eeb922629ee6883fe3
-
SSDEEP
98304:ziXAEqfpQA7KhbchheGvUapVXNe1gNuqh+CaO:eQxRQA7K9QPfZNe1rqh+
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\CrowdstrikeEngine = "rundll32.exe C:\\Users\\Admin\\Documents\\WDEngineUpdater.dll,EntryPoint" reg.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process 2336 2340 WerFault.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exerundll32.execmd.exereg.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
rundll32.exerundll32.exerundll32.execmd.exedescription pid Process procid_target PID 2380 wrote to memory of 2972 2380 rundll32.exe 30 PID 2380 wrote to memory of 2972 2380 rundll32.exe 30 PID 2380 wrote to memory of 2972 2380 rundll32.exe 30 PID 2380 wrote to memory of 2972 2380 rundll32.exe 30 PID 2380 wrote to memory of 2972 2380 rundll32.exe 30 PID 2380 wrote to memory of 2972 2380 rundll32.exe 30 PID 2380 wrote to memory of 2972 2380 rundll32.exe 30 PID 2972 wrote to memory of 2340 2972 rundll32.exe 32 PID 2972 wrote to memory of 2340 2972 rundll32.exe 32 PID 2972 wrote to memory of 2340 2972 rundll32.exe 32 PID 2972 wrote to memory of 2340 2972 rundll32.exe 32 PID 2972 wrote to memory of 2340 2972 rundll32.exe 32 PID 2972 wrote to memory of 2340 2972 rundll32.exe 32 PID 2972 wrote to memory of 2340 2972 rundll32.exe 32 PID 2972 wrote to memory of 2340 2972 rundll32.exe 32 PID 2972 wrote to memory of 2340 2972 rundll32.exe 32 PID 2340 wrote to memory of 2336 2340 rundll32.exe 33 PID 2340 wrote to memory of 2336 2340 rundll32.exe 33 PID 2340 wrote to memory of 2336 2340 rundll32.exe 33 PID 2340 wrote to memory of 2336 2340 rundll32.exe 33 PID 2972 wrote to memory of 316 2972 rundll32.exe 34 PID 2972 wrote to memory of 316 2972 rundll32.exe 34 PID 2972 wrote to memory of 316 2972 rundll32.exe 34 PID 2972 wrote to memory of 316 2972 rundll32.exe 34 PID 316 wrote to memory of 2740 316 cmd.exe 36 PID 316 wrote to memory of 2740 316 cmd.exe 36 PID 316 wrote to memory of 2740 316 cmd.exe 36 PID 316 wrote to memory of 2740 316 cmd.exe 36
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\223a3aa520689c0021d8ce51024d5bb0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\223a3aa520689c0021d8ce51024d5bb0N.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 1964⤵
- Program crash
PID:2336
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "CrowdstrikeEngine" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\WDEngineUpdater.dll",EntryPoint /f & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "CrowdstrikeEngine" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\WDEngineUpdater.dll",EntryPoint /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2740
-
-
-