Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11-11-2024 14:28
Static task
static1
Behavioral task
behavioral1
Sample
P52mX04112024145925383.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
P52mX04112024145925383.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/System.dll
-
Size
12KB
-
MD5
d968cb2b98b83c03a9f02dd9b8df97dc
-
SHA1
d784c9b7a92dce58a5038beb62a48ff509e166a0
-
SHA256
a4ec98011ef99e595912718c1a1bf1aa67bfc2192575729d42f559d01f67b95c
-
SHA512
2ee41dc68f329a1519a8073ece7d746c9f3bf45d8ef3b915deb376af37e26074134af5f83c8af0fe0ab227f0d1acca9f37e5ca7ae37c46c3bcc0331fe5e2b97e
-
SSDEEP
192:CVA1YOTDExj7EFrYCT4E8y3hoSdtTgwF43E7QbGPXI9uIc6w79Mw:CrR7SrtTv53tdtTgwF4SQbGPX36wJMw
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2816 1072 WerFault.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1600 wrote to memory of 1072 1600 rundll32.exe rundll32.exe PID 1600 wrote to memory of 1072 1600 rundll32.exe rundll32.exe PID 1600 wrote to memory of 1072 1600 rundll32.exe rundll32.exe PID 1600 wrote to memory of 1072 1600 rundll32.exe rundll32.exe PID 1600 wrote to memory of 1072 1600 rundll32.exe rundll32.exe PID 1600 wrote to memory of 1072 1600 rundll32.exe rundll32.exe PID 1600 wrote to memory of 1072 1600 rundll32.exe rundll32.exe PID 1072 wrote to memory of 2816 1072 rundll32.exe WerFault.exe PID 1072 wrote to memory of 2816 1072 rundll32.exe WerFault.exe PID 1072 wrote to memory of 2816 1072 rundll32.exe WerFault.exe PID 1072 wrote to memory of 2816 1072 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1072 -s 2203⤵
- Program crash
PID:2816
-
-