Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
08-11-2024 12:12
Static task
static1
Behavioral task
behavioral1
Sample
9d118e57cb67114168ba111349bea057a3263dde14b3ad71c2a5c26a0b2ee28b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9d118e57cb67114168ba111349bea057a3263dde14b3ad71c2a5c26a0b2ee28b.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/System.dll
-
Size
12KB
-
MD5
dd87a973e01c5d9f8e0fcc81a0af7c7a
-
SHA1
c9206ced48d1e5bc648b1d0f54cccc18bf643a14
-
SHA256
7fb0f8d452fefaac789986b933df050f3d3e4feb8a8d9944ada995f572dcdca1
-
SHA512
4910b39b1a99622ac8b3c42f173bbe7035ac2f8d40c946468e7db7e2868a2da81ea94da453857f06f39957dd690c7f1ba498936a7aaa0039975e472376f92e8f
-
SSDEEP
192:VFiQJ77pJp17C8F1A5xjGNxrgFOgb7lrT/993:97pJp48F2exrg5F/9
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2548 2564 WerFault.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2352 wrote to memory of 2564 2352 rundll32.exe rundll32.exe PID 2352 wrote to memory of 2564 2352 rundll32.exe rundll32.exe PID 2352 wrote to memory of 2564 2352 rundll32.exe rundll32.exe PID 2352 wrote to memory of 2564 2352 rundll32.exe rundll32.exe PID 2352 wrote to memory of 2564 2352 rundll32.exe rundll32.exe PID 2352 wrote to memory of 2564 2352 rundll32.exe rundll32.exe PID 2352 wrote to memory of 2564 2352 rundll32.exe rundll32.exe PID 2564 wrote to memory of 2548 2564 rundll32.exe WerFault.exe PID 2564 wrote to memory of 2548 2564 rundll32.exe WerFault.exe PID 2564 wrote to memory of 2548 2564 rundll32.exe WerFault.exe PID 2564 wrote to memory of 2548 2564 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 2243⤵
- Program crash
PID:2548
-
-