Analysis
-
max time kernel
94s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2024, 22:36
Static task
static1
Behavioral task
behavioral1
Sample
grando.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
grando.dll
Resource
win10v2004-20240802-en
General
-
Target
grando.dll
-
Size
73.3MB
-
MD5
4a80191a2d6a3b7c5f8c0dccfcd3991b
-
SHA1
45fdeea31c16fc2f65485172e13fdf687d3a15d8
-
SHA256
73fb2f9e20d4242c9b4c42d9b16d04a4ba7215a8cccf4d21c6d85926e14233fa
-
SHA512
d0886fae12b169cd2be6827cad146c505417cf8241a3159acae1d94d38159097c99cdced371c8cb0a7fc5c293f944b64af49a2090555e7702b49a72e151adc02
-
SSDEEP
393216:j22jUPP2urAAVeEvpaZ+25FcHTylRtLRB1PYdK4iO5iPGfsNdUTm34Dsq8fd0B/S:SSl3PyKz4
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3468 4580 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4580 rundll32.exe 4580 rundll32.exe 4580 rundll32.exe 4580 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1744 wrote to memory of 4580 1744 rundll32.exe 83 PID 1744 wrote to memory of 4580 1744 rundll32.exe 83 PID 1744 wrote to memory of 4580 1744 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\grando.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\grando.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4580 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4580 -s 11643⤵
- Program crash
PID:3468
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4580 -ip 45801⤵PID:3604