Analysis
-
max time kernel
139s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 02:27
Behavioral task
behavioral1
Sample
d8ab177de127bcc2797ecc4dc6f988c2b82760fe5aa9938fbd7ebd2f976825c6.dll
Resource
win7-20240903-en
3 signatures
150 seconds
General
-
Target
d8ab177de127bcc2797ecc4dc6f988c2b82760fe5aa9938fbd7ebd2f976825c6.dll
-
Size
25KB
-
MD5
3996d56287a34c04981d4e315bf2afd4
-
SHA1
9904053e5bc142898d894026172edd7a71c7a4ca
-
SHA256
d8ab177de127bcc2797ecc4dc6f988c2b82760fe5aa9938fbd7ebd2f976825c6
-
SHA512
bf4aa5a037fb7a8ae4b60ec681d05575cb0e06f13e60ce77db5debbf7b431d0bd850d20734872f6397a9f374c562b4d9248290d40554e011c4b7e976b6542f49
-
SSDEEP
384:dmD/Y0M6vDHgJZ1wZj9BCHjvBRnM1a0INSVBt2EVeNpFtPw9Em:duYxCDHgJZMj9QBlSVov7w9
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1080-0-0x0000000075480000-0x000000007548B000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3820 1080 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1784 wrote to memory of 1080 1784 rundll32.exe 83 PID 1784 wrote to memory of 1080 1784 rundll32.exe 83 PID 1784 wrote to memory of 1080 1784 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d8ab177de127bcc2797ecc4dc6f988c2b82760fe5aa9938fbd7ebd2f976825c6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d8ab177de127bcc2797ecc4dc6f988c2b82760fe5aa9938fbd7ebd2f976825c6.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1080 -s 5403⤵
- Program crash
PID:3820
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1080 -ip 10801⤵PID:4888