Analysis
-
max time kernel
110s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 05:42
Behavioral task
behavioral1
Sample
d780b0fe7b5405e3d83f2421231da7d0N.dll
Resource
win7-20240903-en
4 signatures
120 seconds
General
-
Target
d780b0fe7b5405e3d83f2421231da7d0N.dll
-
Size
70KB
-
MD5
d780b0fe7b5405e3d83f2421231da7d0
-
SHA1
42e924dd5cd7fc2904010e9b4239c0351a4b8638
-
SHA256
5a2b46192ba60590cf7c691356ef06ec91e9b0a6650e86605f43336d14afc6e4
-
SHA512
a0d04e4808a527c12471a93e1957917cf80e97dcac519fe6396dcc2209f157123eb2fc0a7b76a0f97b6f283dc0ead2b22002b81c03bfabc7b2d367aefa3c1196
-
SSDEEP
1536:lXLwtq0c49MKioFjSz1UFLE/dW5MMbKl89h9LMTlp/8zWqlLqw7t1FVSr77GnouE:lXLwt/FiaU1Uq/dWFbNr8azD7VS372oX
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2520-0-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral1/memory/2520-1-0x0000000000440000-0x0000000000476000-memory.dmp upx behavioral1/memory/2520-3-0x0000000000400000-0x0000000000436000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3012 2520 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2332 wrote to memory of 2520 2332 regsvr32.exe 31 PID 2332 wrote to memory of 2520 2332 regsvr32.exe 31 PID 2332 wrote to memory of 2520 2332 regsvr32.exe 31 PID 2332 wrote to memory of 2520 2332 regsvr32.exe 31 PID 2332 wrote to memory of 2520 2332 regsvr32.exe 31 PID 2332 wrote to memory of 2520 2332 regsvr32.exe 31 PID 2332 wrote to memory of 2520 2332 regsvr32.exe 31 PID 2520 wrote to memory of 3012 2520 regsvr32.exe 32 PID 2520 wrote to memory of 3012 2520 regsvr32.exe 32 PID 2520 wrote to memory of 3012 2520 regsvr32.exe 32 PID 2520 wrote to memory of 3012 2520 regsvr32.exe 32
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\d780b0fe7b5405e3d83f2421231da7d0N.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\d780b0fe7b5405e3d83f2421231da7d0N.dll2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2520 -s 3203⤵
- Program crash
PID:3012
-
-