Analysis
-
max time kernel
0s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
19-09-2024 05:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
dbdata16.dll
Resource
win11-20240802-en
windows11-21h2-x64
3 signatures
60 seconds
General
-
Target
dbdata16.dll
-
Size
802KB
-
MD5
684b0c1383fc76db0a51a37609610d84
-
SHA1
a139468754d44a3dc5a2a1c8d8eb7ee1e319a4cb
-
SHA256
aa1aa289eb9c05811c23f04e3896da467507e38001bdf8e288ed7004621c8f6c
-
SHA512
569291565b3df4ae01317a64c282e2d4b825cad132184e40feedecce487138fed4682bca5970073a6112d8ab44d5d0f54121c4306557e1cebe0a9488a5b85163
-
SSDEEP
24576:iXOo/y/xLOfTNs91SnddvRTnF+ubty8E5h/:/zWvRTMut6r/
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1060 3832 WerFault.exe 79 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 724 wrote to memory of 3832 724 rundll32.exe 79 PID 724 wrote to memory of 3832 724 rundll32.exe 79 PID 724 wrote to memory of 3832 724 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dbdata16.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dbdata16.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3832 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3832 -s 5443⤵
- Program crash
PID:1060
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3832 -ip 38321⤵PID:2292