Analysis
-
max time kernel
110s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 05:45
Static task
static1
Behavioral task
behavioral1
Sample
b431eca76a4ee8378515897320fecde0N.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b431eca76a4ee8378515897320fecde0N.dll
Resource
win10v2004-20240802-en
General
-
Target
b431eca76a4ee8378515897320fecde0N.dll
-
Size
137KB
-
MD5
b431eca76a4ee8378515897320fecde0
-
SHA1
615fd73a892043d87e2262d004bd3c50a3381b30
-
SHA256
5fce6066258b1c384b76c95ba2307d25fe5df991dd1b816533f05f3a4d2e0872
-
SHA512
a1cab8cc675bb97a644cf01c3a5d3946e29605911006fe74e0c1db5362a29832de511ae60c06adccbddacd80adb791b25d1278b5c1a509e22c7b26b91ba4dbc3
-
SSDEEP
3072:JR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuU:E25GgFny61mraC
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2348 2068 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1648 wrote to memory of 2068 1648 rundll32.exe 31 PID 1648 wrote to memory of 2068 1648 rundll32.exe 31 PID 1648 wrote to memory of 2068 1648 rundll32.exe 31 PID 1648 wrote to memory of 2068 1648 rundll32.exe 31 PID 1648 wrote to memory of 2068 1648 rundll32.exe 31 PID 1648 wrote to memory of 2068 1648 rundll32.exe 31 PID 1648 wrote to memory of 2068 1648 rundll32.exe 31 PID 2068 wrote to memory of 2348 2068 rundll32.exe 32 PID 2068 wrote to memory of 2348 2068 rundll32.exe 32 PID 2068 wrote to memory of 2348 2068 rundll32.exe 32 PID 2068 wrote to memory of 2348 2068 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b431eca76a4ee8378515897320fecde0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b431eca76a4ee8378515897320fecde0N.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2068 -s 2283⤵
- Program crash
PID:2348
-
-