Analysis
-
max time kernel
135s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2024 00:55
Static task
static1
Behavioral task
behavioral1
Sample
QUOTATION.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
QUOTATION.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
k08cwjcrlzilk8t.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
k08cwjcrlzilk8t.dll
Resource
win10v2004-20240802-en
General
-
Target
k08cwjcrlzilk8t.dll
-
Size
13KB
-
MD5
05ad6c2690084ff9cc4ff14b455b781e
-
SHA1
9b0ff8da652e83aa675bfc5fd7d5c9173d134509
-
SHA256
97de472526c14080264663f4b729df51c4208a1e37d190a0412076a682f0aa7b
-
SHA512
e48f4b3ac853d6669f5e9f2dd7516eb268941f50189e6f99a7d5f4ef9bab88709bc6c9c02267e6f61659dba50c67163481376c3cb6d4e5bc7a6641f15b9e309e
-
SSDEEP
192:hMvg35NXh2oeh05mdX7zAnMVm8j5Ykrx/FTwB72yUnbcpAY05ASxVkEw6ZIYNQ:hM8X2/Dhvp7Bx/K4bcpgASEE3ZlN
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\name = "C:\\Users\\Admin\\AppData\\Roaming\\folder\\file.exe" rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4436 2608 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2608 rundll32.exe 2608 rundll32.exe 2608 rundll32.exe 2608 rundll32.exe 2608 rundll32.exe 2608 rundll32.exe 2608 rundll32.exe 2608 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3956 wrote to memory of 2608 3956 rundll32.exe 84 PID 3956 wrote to memory of 2608 3956 rundll32.exe 84 PID 3956 wrote to memory of 2608 3956 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\k08cwjcrlzilk8t.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\k08cwjcrlzilk8t.dll,#12⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2608 -s 7403⤵
- Program crash
PID:4436
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2608 -ip 26081⤵PID:2452