Analysis
-
max time kernel
97s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 12:55
Static task
static1
Behavioral task
behavioral1
Sample
55507a82fa1faaa86d8eec3a77675420N.dll
Resource
win7-20240708-en
General
-
Target
55507a82fa1faaa86d8eec3a77675420N.dll
-
Size
30KB
-
MD5
55507a82fa1faaa86d8eec3a77675420
-
SHA1
67132291d743d80502f9825004491bf752d055a5
-
SHA256
2f50bd3ec868c820a213cfdd9d9d8c751f824de44623bc7740d7421cde402304
-
SHA512
15402d47ba8b2801444a11f73bd0e6e69dd19e61c1df0266a4ac4db5dee148b81d11a8ca732fed526327e5397c7bb1e5a52a4a1ae49b20ea6dcd4536da05869d
-
SSDEEP
384:NKw+tHaY5MizvlslmCeUlEpavsdc90pMiDdNPw4JYDlMlz8ln8ME4bo7L:N9+tHaS2Z5aakdi0ptDn9sup8d84bof
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4640 4704 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1104 wrote to memory of 4704 1104 rundll32.exe 83 PID 1104 wrote to memory of 4704 1104 rundll32.exe 83 PID 1104 wrote to memory of 4704 1104 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\55507a82fa1faaa86d8eec3a77675420N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\55507a82fa1faaa86d8eec3a77675420N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 6363⤵
- Program crash
PID:4640
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4704 -ip 47041⤵PID:3624