Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 04:40
Behavioral task
behavioral1
Sample
WPE/WWQQQQ.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
WPE/WWQQQQ.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
WPE/wpe.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
WPE/wpe.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
wpe/Usp10.dll
Resource
win7-20241010-en
General
-
Target
WPE/WWQQQQ.dll
-
Size
180KB
-
MD5
3fb67ceab8fb223312492842d7901e01
-
SHA1
24d701c846e164d8e9823237393f4bdfeef48fc1
-
SHA256
f0dc0e0813b1c63f9c6e9250558cbb1ff255ce2f077c1fc84f7f8f1efee69f62
-
SHA512
5eb565a0a8fa86770590b694380e3fa1e5f3863e959d2cfc6f089dd3b44daaf9384f2067a971806f8d9e7a9e3207e9f312cf82d33c36d4a866caacffe6d6c12d
-
SSDEEP
768:aCDlRInSTu6xpi9Hk+o4xTTWVWWwBHt3HOgiHFEkOlZCYLtfo85k2B:aLSTVOkz4xTTWKteB2kOl7lo8+2B
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 892 wrote to memory of 524 892 rundll32.exe 83 PID 892 wrote to memory of 524 892 rundll32.exe 83 PID 892 wrote to memory of 524 892 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\WPE\WWQQQQ.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\WPE\WWQQQQ.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:524
-