Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 20:12
Behavioral task
behavioral1
Sample
ce3a6d5929ab62109d91d6ad0d8799a0N.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ce3a6d5929ab62109d91d6ad0d8799a0N.dll
Resource
win10v2004-20240802-en
General
-
Target
ce3a6d5929ab62109d91d6ad0d8799a0N.dll
-
Size
81KB
-
MD5
ce3a6d5929ab62109d91d6ad0d8799a0
-
SHA1
2fc6a47c6c2d51b96ccaf2dc998a1f749a093577
-
SHA256
e7cdce56451b2ac4a1ed7c00611a4eee3b3574a8fa37f99557c1af50765af00f
-
SHA512
66b9d06fc22c713f596f019fcea2866b4ea4ee1e2e240f0ceaf59cf10fe1ad8814dff5268323648a548078a6600aa3f2725f0e88d22d0df85932f14e386b78ce
-
SSDEEP
1536:QFB54A6pC2gp80f5zFi4NJO255Bvs5X1qS00:QX54A6pCvdFiUJjHBU5X1qF0
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3984-0-0x0000000010000000-0x0000000010016000-memory.dmp upx behavioral2/memory/3984-1-0x0000000010000000-0x0000000010016000-memory.dmp upx -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3520 3984 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 712 wrote to memory of 3984 712 rundll32.exe 83 PID 712 wrote to memory of 3984 712 rundll32.exe 83 PID 712 wrote to memory of 3984 712 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ce3a6d5929ab62109d91d6ad0d8799a0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ce3a6d5929ab62109d91d6ad0d8799a0N.dll,#12⤵
- Modifies WinLogon
- System Location Discovery: System Language Discovery
PID:3984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3984 -s 7523⤵
- Program crash
PID:3520
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3984 -ip 39841⤵PID:2840