Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 00:20
Static task
static1
Behavioral task
behavioral1
Sample
952b976758c83fa247f417fb3195277c1522222a92a897a7f8ed66d74bde7ecdN.dll
Resource
win7-20240708-en
General
-
Target
952b976758c83fa247f417fb3195277c1522222a92a897a7f8ed66d74bde7ecdN.dll
-
Size
343KB
-
MD5
0200557e45133b8e58841b36be401e00
-
SHA1
d2870cbeb09754804deb00ead0db443668064afd
-
SHA256
952b976758c83fa247f417fb3195277c1522222a92a897a7f8ed66d74bde7ecd
-
SHA512
ffcd3ba30fa7f2b6a8abe767ca851759dba8ac811bdcc952ad7c26275609c645747892a5f09be0f543e09d01f2cdb38121acaab686cb2feeb9f4f0a4d73210ba
-
SSDEEP
6144:pMJOWK4l0wqOVq1ZweJ2L9Y+fJsaosgF315PjWGpNcAlURB:p2OWK4llnZY+ms015PjlpyEUf
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4200 rundll32mgr.exe 4352 rundll32mgrmgr.exe -
Loads dropped DLL 2 IoCs
pid Process 4352 rundll32mgrmgr.exe 4200 rundll32mgr.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe File created C:\Windows\SysWOW64\rundll32mgrmgr.exe rundll32mgr.exe -
resource yara_rule behavioral2/memory/4200-15-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4352-12-0x0000000000400000-0x0000000000443000-memory.dmp upx -
Program crash 2 IoCs
pid pid_target Process procid_target 4996 4352 WerFault.exe 86 1252 4200 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgrmgr.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3840 wrote to memory of 5040 3840 rundll32.exe 84 PID 3840 wrote to memory of 5040 3840 rundll32.exe 84 PID 3840 wrote to memory of 5040 3840 rundll32.exe 84 PID 5040 wrote to memory of 4200 5040 rundll32.exe 85 PID 5040 wrote to memory of 4200 5040 rundll32.exe 85 PID 5040 wrote to memory of 4200 5040 rundll32.exe 85 PID 4200 wrote to memory of 4352 4200 rundll32mgr.exe 86 PID 4200 wrote to memory of 4352 4200 rundll32mgr.exe 86 PID 4200 wrote to memory of 4352 4200 rundll32mgr.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\952b976758c83fa247f417fb3195277c1522222a92a897a7f8ed66d74bde7ecdN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\952b976758c83fa247f417fb3195277c1522222a92a897a7f8ed66d74bde7ecdN.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Windows\SysWOW64\rundll32mgrmgr.exeC:\Windows\SysWOW64\rundll32mgrmgr.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4352 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4352 -s 101765⤵
- Program crash
PID:4996
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 101844⤵
- Program crash
PID:1252
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4200 -ip 42001⤵PID:2008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4352 -ip 43521⤵PID:3040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
Filesize
191KB
MD5d3d9e83859d00c69a12e334852e0e40e
SHA188b6d73a9a92b96f017417e346781aa62e412112
SHA2563b50ec5daef877dabead21459e6e6dd8de74ea4fbdaf1163768e0376b4060887
SHA5123f565d70caa9139068468cb296f15a05d5921d01362f04bb2996007683bf8816dbc6338283acba22d8349c1214c98bddb476fef3878b97f555acd46ac8754fe2
-
Filesize
94KB
MD58abf6898662a995642dd979ff1fe5eef
SHA108aeda19120993801a6f3a8aa2b73b559ed361ad
SHA2568aa6d0613c1ad6326d92678bc90dd10be1fba7a5b5f9d7a4a6fac6a42baf94cb
SHA512a1e88bde3478d8a0c74824998b13e1fdf4484eec444540352076acc43675ecd2daed86e719b3889e7e8ce2104b2b7259a237b42d474acbca8f7e7fb3f37a3313