Analysis
-
max time kernel
132s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2024 06:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
640000.dll
Resource
win7-20241023-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
640000.dll
Resource
win10v2004-20241007-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
640000.dll
-
Size
10.0MB
-
MD5
11c47f724c79c872d4c33fad697a4e3b
-
SHA1
3e40b2e4d495bccf5b8cebeab7e328099da75845
-
SHA256
14b9f02f73beae4010ed6055aef0624523a4dae0a7bfcd156da7cb4f67a9b7d2
-
SHA512
178e763476d6de7d187b5a0011a21153f2d2703c4989385133ee74363e9e609eda701ca96a80300eefc69f50b12eb8fd40800d73acf299deb84e321496cd8579
-
SSDEEP
196608:PSGD7BHWkSiB1plGcvKRTU42tKZDftOS2MT9ExL9o:P1v0kduc0TH2EztRaxL
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5036 4920 WerFault.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4544 wrote to memory of 4920 4544 rundll32.exe rundll32.exe PID 4544 wrote to memory of 4920 4544 rundll32.exe rundll32.exe PID 4544 wrote to memory of 4920 4544 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\640000.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\640000.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4920 -s 5643⤵
- Program crash
PID:5036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4920 -ip 49201⤵PID:1520