Analysis
-
max time kernel
133s -
max time network
136s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
submitted
26/08/2024, 10:39
Behavioral task
behavioral1
Sample
Injector.exe
Resource
win10-20240404-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
Injector.exe
Resource
win10v2004-20240802-en
1 signatures
150 seconds
Behavioral task
behavioral3
Sample
fata.dll
Resource
win10-20240404-en
3 signatures
150 seconds
Behavioral task
behavioral4
Sample
fata.dll
Resource
win10v2004-20240802-en
6 signatures
150 seconds
General
-
Target
fata.dll
Score
3/10
Malware Config
Signatures
-
Program crash 2 IoCs
pid pid_target Process procid_target 2988 68 WerFault.exe 73 220 68 WerFault.exe 73 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4520 wrote to memory of 68 4520 rundll32.exe 73 PID 4520 wrote to memory of 68 4520 rundll32.exe 73 PID 4520 wrote to memory of 68 4520 rundll32.exe 73
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fata.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fata.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:68 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 68 -s 5963⤵
- Program crash
PID:2988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 68 -s 6883⤵
- Program crash
PID:220
-
-