Overview
overview
10Static
static
3tera1.zip
windows10-2004-x64
100a4scandoc.exe
windows10-2004-x64
107z.dll
windows10-2004-x64
3AppointmentApis.dll
windows10-2004-x64
1Microsoft....ty.dll
windows10-2004-x64
1WINSSNAP.dll
windows10-2004-x64
1appraiser.dll
windows10-2004-x64
1msvcr100.dll
windows10-2004-x64
3wlanpref.dll
windows10-2004-x64
1wxmsw32u_x...om.dll
windows10-2004-x64
1Analysis
-
max time kernel
92s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-09-2024 20:56
Static task
static1
Behavioral task
behavioral1
Sample
tera1.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
0a4scandoc.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
7z.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
AppointmentApis.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Microsoft.PowerShell.Commands.Utility.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
WINSSNAP.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
appraiser.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
msvcr100.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
wlanpref.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
wxmsw32u_xrc_gcc_custom.dll
Resource
win10v2004-20240802-en
General
-
Target
7z.dll
-
Size
1.1MB
-
MD5
8915c81b1da3f8e9ac6d9cb7f9b7c105
-
SHA1
4f9f117eab2e75df3c2cd85bbad307d58990657d
-
SHA256
92f6e97c9177361ee5425826585e6e4470052a36bb4e0d0e8667e83b41652c2f
-
SHA512
8f4440fc3028a16f76deee8b14bab3e973bc4e66e9cefa0fb862d3c010465ae0d1d1a592b6f97d18f4fa123379d85d6c15081f67a8383eb19d96fb84771fdbb7
-
SSDEEP
24576:0z+JvxNkWnteez2uuj6FKpCdouNOkiTONXrnl+A4wrvL4/kUjhB9:06JvbrnFz2uuj6FKpHuzXrn8A9zLIkUx
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4868 2280 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4836 wrote to memory of 2280 4836 rundll32.exe 83 PID 4836 wrote to memory of 2280 4836 rundll32.exe 83 PID 4836 wrote to memory of 2280 4836 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7z.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7z.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2280 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2280 -s 6083⤵
- Program crash
PID:4868
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2280 -ip 22801⤵PID:4884