Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-11-2024 19:55
Static task
static1
Behavioral task
behavioral1
Sample
mozglue.dll
Resource
win7-20240903-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
mozglue.dll
Resource
win10v2004-20241007-en
3 signatures
150 seconds
General
-
Target
mozglue.dll
-
Size
593KB
-
MD5
c8fd9be83bc728cc04beffafc2907fe9
-
SHA1
95ab9f701e0024cedfbd312bcfe4e726744c4f2e
-
SHA256
ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
-
SHA512
fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
SSDEEP
12288:BlSyAom/gcRKMdRm4wFkRHuyG4RRGJVDjMk/x21R8gY/r:BKgcRKMdRm4wFkVVDGJVv//x21R8br
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2352 1272 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2060 wrote to memory of 1272 2060 rundll32.exe 30 PID 2060 wrote to memory of 1272 2060 rundll32.exe 30 PID 2060 wrote to memory of 1272 2060 rundll32.exe 30 PID 2060 wrote to memory of 1272 2060 rundll32.exe 30 PID 2060 wrote to memory of 1272 2060 rundll32.exe 30 PID 2060 wrote to memory of 1272 2060 rundll32.exe 30 PID 2060 wrote to memory of 1272 2060 rundll32.exe 30 PID 1272 wrote to memory of 2352 1272 rundll32.exe 31 PID 1272 wrote to memory of 2352 1272 rundll32.exe 31 PID 1272 wrote to memory of 2352 1272 rundll32.exe 31 PID 1272 wrote to memory of 2352 1272 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\mozglue.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\mozglue.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1272 -s 2203⤵
- Program crash
PID:2352
-
-