Resubmissions

15-09-2024 14:51

240915-r74zlaydmb 10

Analysis

  • max time kernel
    144s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-09-2024 14:51

General

  • Target

    vulkan-1.dll

  • Size

    760KB

  • MD5

    c48f50e936f17683bef64f7e2eea79d1

  • SHA1

    f84de3d32f8850431f9da7f0426c1fd7f6e1498f

  • SHA256

    05fde012314ea6c3437e162de8cbb7a4ef3c707938b0143c5231c130750fb6c4

  • SHA512

    a6bcd73e0253a622f7899e821de9cc388b0b6e5ae48d140a1e77a541cd37639e893ee631353a03782cae916b9d65358ef272b4aa60e9f717e048884c9ca9a7f4

  • SSDEEP

    12288:EEEBH2v8UEjbDzH7yXSPD+o17DdKZwJA96Z5W1DYsHq6g3P0zAk7IuSy:EEEB+8UE3/H7yXUCo17D0w+96Z5W1DY4

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\vulkan-1.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5052
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\vulkan-1.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1060
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1060 -s 620
        3⤵
        • Program crash
        PID:3792
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1060 -ip 1060
    1⤵
      PID:4964

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads