Analysis
-
max time kernel
126s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
submitted
27/09/2024, 13:18
Behavioral task
behavioral1
Sample
Fatality.dll
Resource
win10v2004-20240802-en
10 signatures
300 seconds
General
-
Target
Fatality.dll
-
Size
36.1MB
-
MD5
38bf550f8d73ea9791d7778d9b6b44a8
-
SHA1
67bf70a4d78f9f18b1af30cd9c85c632b52188c1
-
SHA256
ed6566cd8828d0d9a7bd2bd7731df7703977d9b18fa7ede31bb8b1835b12da78
-
SHA512
cfff6d55b90a42be22d09aaf30eed718b71fff8bfddab2404e968359a18ab8aec679a4ca85e144d3527602fd515a03724e897addd68865e796b0a387f582fd7f
-
SSDEEP
393216:g4S82OrtN+zJkGsF20dH5ZXtpKjzw1QxgvLqmNAmjpy:7OOrtN+zJkGsF2OZZXuv4GcLjp
Score
3/10
Malware Config
Signatures
-
Program crash 2 IoCs
pid pid_target Process procid_target 3680 1380 WerFault.exe 83 3388 1380 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2936 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2936 taskmgr.exe Token: SeSystemProfilePrivilege 2936 taskmgr.exe Token: SeCreateGlobalPrivilege 2936 taskmgr.exe Token: SeSecurityPrivilege 2936 taskmgr.exe Token: SeTakeOwnershipPrivilege 2936 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe 2936 taskmgr.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5112 wrote to memory of 1380 5112 rundll32.exe 83 PID 5112 wrote to memory of 1380 5112 rundll32.exe 83 PID 5112 wrote to memory of 1380 5112 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Fatality.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Fatality.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1380 -s 5523⤵
- Program crash
PID:3680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1380 -s 8323⤵
- Program crash
PID:3388
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1380 -ip 13801⤵PID:1028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1380 -ip 13801⤵PID:2248
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3552
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2936
-
C:\Windows\System32\0zy1bv.exe"C:\Windows\System32\0zy1bv.exe"1⤵PID:4880