Analysis
-
max time kernel
94s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 22:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1/OTC.dll
Resource
win7-20240708-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
1/OTC.dll
Resource
win10v2004-20240802-en
3 signatures
150 seconds
General
-
Target
1/OTC.dll
-
Size
2.8MB
-
MD5
09a5a8259a5df0a3ba799865c6427124
-
SHA1
29a80cd303b1ac8c70258bef1d129a7b6d1c3452
-
SHA256
6b1c19cc6312fb85794c042f2407279b9c94d146d995b10ac1dbf4a4ebb0686d
-
SHA512
872be3168396982d746c228c2201a9e59687a03c6a0adae6f8d4f2208a44d7170ba2c668c16f30d068e7618701a3e288c7c8282a3925fcf131959f48f9e96436
-
SSDEEP
49152:C7+/NFLED+VlfRVBnbmdOqz854fy/PGuaiucb2sdcdk3YZ/8/RRLMSaYzRFo1Uvj:y+/3LEC3fjZbmddoify/+uaiucb2sadD
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3548 3844 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3624 wrote to memory of 3844 3624 rundll32.exe 84 PID 3624 wrote to memory of 3844 3624 rundll32.exe 84 PID 3624 wrote to memory of 3844 3624 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1\OTC.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1\OTC.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3844 -s 5403⤵
- Program crash
PID:3548
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3844 -ip 38441⤵PID:4880