Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-10-2024 08:06
Behavioral task
behavioral1
Sample
Fatality.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Fatality.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Server.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
Server.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
injector.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
injector.exe
Resource
win10v2004-20241007-en
General
-
Target
Fatality.dll
-
Size
2.8MB
-
MD5
3323f35eb27d6e6e016cb1d6537adf6f
-
SHA1
1a511738d41cdc91884b395dcb749c6f709fbfe7
-
SHA256
638e5488d25b52539007bf511b5dce511dd6632f3816d97d2514150bfe50acc9
-
SHA512
f7d31dcca07c5b280690f89ca42a21adcc870c3c637f5d2f0c1ab07e66db54064c185187f5c5473129e632de11f211be1e6917fa9c748db0ea67ee192a64b80b
-
SSDEEP
49152:Y+/NFLED+VlfRVBnbmdOqz851fy/fGuaiucb2sdcdk3YZ/8/RRLMSaYzRFo1Uvo1:Y+/3LEC3fjZbmddoPfy/uuaiucb2sadD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2312 2276 rundll32.exe 31 PID 2276 wrote to memory of 2312 2276 rundll32.exe 31 PID 2276 wrote to memory of 2312 2276 rundll32.exe 31 PID 2276 wrote to memory of 2312 2276 rundll32.exe 31 PID 2276 wrote to memory of 2312 2276 rundll32.exe 31 PID 2276 wrote to memory of 2312 2276 rundll32.exe 31 PID 2276 wrote to memory of 2312 2276 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Fatality.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Fatality.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2312
-