Analysis
-
max time kernel
91s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 01:58
Static task
static1
Behavioral task
behavioral1
Sample
b84bad0674108e09eb3c974e8ffbaf901e69ca2939dfe70527fb369fe2df831e.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b84bad0674108e09eb3c974e8ffbaf901e69ca2939dfe70527fb369fe2df831e.dll
Resource
win10v2004-20240802-en
General
-
Target
b84bad0674108e09eb3c974e8ffbaf901e69ca2939dfe70527fb369fe2df831e.dll
-
Size
25.3MB
-
MD5
a1d3922228fcfb9b734d3d92213cf525
-
SHA1
21834950d507117c0c9d9e4c42c76c1e5f41b61c
-
SHA256
b84bad0674108e09eb3c974e8ffbaf901e69ca2939dfe70527fb369fe2df831e
-
SHA512
d6d783f269831120902c718b1696865df89e649dbcc51bc93ff86feaf4a4944d2c8593cc3c8d5f4a6983379b4e961b453101406ab70ea150379aa3cc63d15b43
-
SSDEEP
393216:TS1wSi0DGQ6h03sRIPNjIILppBc284JEIFi3rEf8LVuqL9Ha5Ate:YwSi08hE0qTfBcH4HFs0IVuqLFaH
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2708 rundll32.exe 2708 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4004 2708 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2708 rundll32.exe 2708 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1240 wrote to memory of 2708 1240 rundll32.exe 81 PID 1240 wrote to memory of 2708 1240 rundll32.exe 81 PID 1240 wrote to memory of 2708 1240 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b84bad0674108e09eb3c974e8ffbaf901e69ca2939dfe70527fb369fe2df831e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b84bad0674108e09eb3c974e8ffbaf901e69ca2939dfe70527fb369fe2df831e.dll,#12⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2708 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 7203⤵
- Program crash
PID:4004
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2708 -ip 27081⤵PID:1220