Analysis

  • max time kernel
    140s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-10-2024 18:19

General

  • Target

    $PLUGINSDIR/util_ex.dll

  • Size

    776KB

  • MD5

    80b2e3d8a6a283c2019bf239a60cbbc5

  • SHA1

    a6b63dce1cb4741f443332a7ccb52031088918ee

  • SHA256

    cd564402cfe6744b2f9fe8df895fa9f30650c9061a4e4ec1bc71603ce1bc031d

  • SHA512

    c7c645939a5e237393958a75f39f7c9990116967aa9cc3388b7b14370ccca0c839f6579a56cf8bce08ba43ce847a0d6046a8a43730680e261a61ca0d401558c2

  • SSDEEP

    12288:gnpNIoldAkQzJ9JePTgiqmKW8wYfkFHR7QcVGMp8c6Gh+CA1bGk45NdwvG2:gfg9Ur+Wuc54MJ4CKGkgW

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\util_ex.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4912
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\util_ex.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1564
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1564 -s 624
        3⤵
        • Program crash
        PID:4624
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1564 -ip 1564
    1⤵
      PID:3264

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads