Malware Analysis Report

2024-12-07 03:26

Sample ID 241113-crdedavepq
Target 3f416918bd125281304aad7b443c03de9fb8d3d22316ff0c47b5c18a1793bc70.exe
SHA256 3f416918bd125281304aad7b443c03de9fb8d3d22316ff0c47b5c18a1793bc70
Tags
discovery remcos lonewolf persistence rat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

3f416918bd125281304aad7b443c03de9fb8d3d22316ff0c47b5c18a1793bc70

Threat Level: Known bad

The file 3f416918bd125281304aad7b443c03de9fb8d3d22316ff0c47b5c18a1793bc70.exe was found to be: Known bad.

Malicious Activity Summary

discovery remcos lonewolf persistence rat

Remcos family

Remcos

Loads dropped DLL

Adds Run key to start application

Suspicious use of NtSetInformationThreadHideFromDebugger

Suspicious use of SetThreadContext

Unsigned PE

Program crash

Enumerates physical storage devices

System Location Discovery: System Language Discovery

NSIS installer

Suspicious use of WriteProcessMemory

Suspicious behavior: MapViewOfSection

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-13 02:18

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

NSIS installer

installer
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral4

Detonation Overview

Submitted

2024-11-13 02:18

Reported

2024-11-13 02:20

Platform

win10v2004-20241007-en

Max time kernel

94s

Max time network

138s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2836 wrote to memory of 4992 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2836 wrote to memory of 4992 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2836 wrote to memory of 4992 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4992 -ip 4992

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 612

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 68.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 53.210.109.20.in-addr.arpa udp
US 8.8.8.8:53 241.42.69.40.in-addr.arpa udp
US 8.8.8.8:53 100.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 0.205.248.87.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp

Files

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-13 02:18

Reported

2024-11-13 02:20

Platform

win7-20240903-en

Max time kernel

120s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\3f416918bd125281304aad7b443c03de9fb8d3d22316ff0c47b5c18a1793bc70.exe"

Signatures

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\3f416918bd125281304aad7b443c03de9fb8d3d22316ff0c47b5c18a1793bc70.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\3f416918bd125281304aad7b443c03de9fb8d3d22316ff0c47b5c18a1793bc70.exe

"C:\Users\Admin\AppData\Local\Temp\3f416918bd125281304aad7b443c03de9fb8d3d22316ff0c47b5c18a1793bc70.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 524

Network

N/A

Files

\Users\Admin\AppData\Local\Temp\nst9C03.tmp\System.dll

MD5 12b140583e3273ee1f65016becea58c4
SHA1 92df24d11797fefd2e1f8d29be9dfd67c56c1ada
SHA256 014f1dfeb842cf7265a3644bc6903c592abe9049bfc7396829172d3d72c4d042
SHA512 49ffdfa1941361430b6acb3555fd3aa05e4120f28cbdf7ceaa2af5937d0b8cccd84471cf63f06f97cf203b4aa20f226bdad082e9421b8e6b62ab6e1e9fc1e68a

C:\Users\Admin\AppData\Local\Temp\nsj9C63.tmp

MD5 8ce4b16b22b58894aa86c421e8759df3
SHA1 13fbd79c3d390e5d6585a21e11ff5ec1970cff0c
SHA256 8254c329a92850f6d539dd376f4816ee2764517da5e0235514af433164480d7a
SHA512 2af8a9104b3f64ed640d8c7e298d2d480f03a3610cbc2b33474321ec59024a48592ea8545e41e09d5d1108759df48ede0054f225df39d4f0f312450e0aa9dd25

C:\Users\Admin\AppData\Local\Temp\nsj9C63.tmp

MD5 25bc6654798eb508fa0b6343212a74fe
SHA1 15d5e1d3b948fd5986aaff7d9419b5e52c75fc93
SHA256 8e5202705183bd3a20a29e224499b0f77a8273ee33cd93cca71043c57ad4bdfc
SHA512 5868c6241ed3cfcc5c34bfe42e4b9f5c69e74975e524771d8c9f35cafc13fd01cd943ec4d8caefee79a1f4a457e69d20b7a86f88db83a5bc3e6bd8a619972898

C:\Users\Admin\AppData\Local\Temp\nsj9C63.tmp

MD5 4e27f2226785e9abbe046fc592668860
SHA1 28b18a7f383131df509f7191f946a32c5a2e410c
SHA256 01a219245e1501fee01ce0baea8f6065ce5162cea12fa570689a07c9717be81d
SHA512 2a23585835bdb5db8175cab265566042282841efdcee8aaba8b9b5d466b0f165c0c5973033ce94bb9a8f07a956689247981ea07ac5a51408263e1653d9710adb

C:\Users\Admin\AppData\Local\Temp\nsj9C63.tmp

MD5 cde63b34c142af0a38cbe83791c964f8
SHA1 ece2b194b486118b40ad12c1f0e9425dd0672424
SHA256 65e2d70166c9a802b7ad2a87129b8945f083e5f268878790a9d1f1c03f47938d
SHA512 0559d3d34ad64ccc27e685431c24fc6ead0f645db14fa0e125a64fb67dbd158c15432c1fc5407811aac8a3486090dfbcfcbc3c6bf5aa0ec73f979ef62d14853c

C:\Users\Admin\AppData\Local\Temp\nsj9C63.tmp

MD5 e2fecc970546c3418917879fe354826c
SHA1 63f1c1dd01b87704a6b6c99fd9f141e0a3064f16
SHA256 ff91566d755f5d038ae698a2cc0a7d4d14e5273afafc37b6f03afda163768fa0
SHA512 3c4a68cbaee94f986515f43305a0e7620c14c30213d4a17db4a3e8a1b996764eb688bf733f472fc52073c2c80bb5229bb29411d7601aefe1c4370e230c341a0a

C:\Users\Admin\AppData\Local\Temp\nsj9C63.tmp

MD5 50484c19f1afdaf3841a0d821ed393d2
SHA1 c65a0fb7e74ffd2c9fc3a0f9aacb0f6a24b0a68b
SHA256 6923dd1bc0460082c5d55a831908c24a282860b7f1cd6c2b79cf1bc8857c639c
SHA512 d51a20d67571fe70bcd6c36e1382a3c342f42671c710090b75fcfc2405ce24488e03a7131eefe4751d0bd3aeaad816605ad10c8e3258d72fcf379e32416cbf3b

C:\Users\Admin\AppData\Local\Temp\nsj9C63.tmp

MD5 67cfa7364c4cf265b047d87ff2e673ae
SHA1 56e27889277981a9b63fcf5b218744a125bbc2fa
SHA256 639b68bd180b47d542dd001d03557ee2d5b3065c3c783143bc9fb548f3fd7713
SHA512 17f28a136b20b89e9c3a418b08fd8e6fcaac960872dc33b2481af2d872efc44228f420759c57724f5d953c7ba98f2283e2acc7dfe5a58cbf719c6480ec7a648b

C:\Users\Admin\AppData\Local\Temp\nsj9C63.tmp

MD5 c3cb69218b85c3260387fb582cb518dd
SHA1 961c892ded09a4cbb5392097bb845ccba65902ad
SHA256 1c329924865741e0222d3ead23072cfbed14f96e2b0432573068eb0640513101
SHA512 2402fffeb89c531db742bf6f5466eee8fe13edf97b8ecfc2cace3522806b322924d1ca81dda25e59b4047b8f40ad11ae9216e0a0d5c7fc6beef4368eb9551422

C:\Users\Admin\AppData\Local\Temp\nsj9C63.tmp

MD5 2b3884fe02299c565e1c37ee7ef99293
SHA1 d8e2ef2a52083f6df210109fea53860ea227af9c
SHA256 ae789a65914ed002efb82dad89e5a4d4b9ec8e7faae30d0ed6e3c0d20f7d3858
SHA512 aeb9374a52d0ad99336bfd4ec7bb7c5437b827845b8784d9c21f7d96a931693604689f6adc3ca25fad132a0ad6123013211ff550f427fa86e4f26c122ac6a0fe

C:\Users\Admin\AppData\Local\Temp\nsj9C63.tmp

MD5 9a53fc1d7126c5e7c81bb5c15b15537b
SHA1 e2d13e0fa37de4c98f30c728210d6afafbb2b000
SHA256 a7de06c22e4e67908840ec3f00ab8fe9e04ae94fb16a74136002afbaf607ff92
SHA512 b0bffbb8072dbdcfc68f0e632f727c08fe3ef936b2ef332c08486553ff2cef7b0bcdb400e421a117e977bb0fac17ce4706a8097e32d558a918433646b6d5f1a1

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-13 02:18

Reported

2024-11-13 02:20

Platform

win10v2004-20241007-en

Max time kernel

93s

Max time network

135s

Command Line

"C:\Users\Admin\AppData\Local\Temp\3f416918bd125281304aad7b443c03de9fb8d3d22316ff0c47b5c18a1793bc70.exe"

Signatures

Remcos

rat remcos

Remcos family

remcos

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Startup key = "C:\\Users\\Admin\\AppData\\Local\\Temp\\subfolder1\\Geoginas.exe" C:\Users\Admin\AppData\Local\Temp\3f416918bd125281304aad7b443c03de9fb8d3d22316ff0c47b5c18a1793bc70.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\3f416918bd125281304aad7b443c03de9fb8d3d22316ff0c47b5c18a1793bc70.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\3f416918bd125281304aad7b443c03de9fb8d3d22316ff0c47b5c18a1793bc70.exe N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\3f416918bd125281304aad7b443c03de9fb8d3d22316ff0c47b5c18a1793bc70.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\3f416918bd125281304aad7b443c03de9fb8d3d22316ff0c47b5c18a1793bc70.exe

"C:\Users\Admin\AppData\Local\Temp\3f416918bd125281304aad7b443c03de9fb8d3d22316ff0c47b5c18a1793bc70.exe"

C:\Users\Admin\AppData\Local\Temp\3f416918bd125281304aad7b443c03de9fb8d3d22316ff0c47b5c18a1793bc70.exe

"C:\Users\Admin\AppData\Local\Temp\3f416918bd125281304aad7b443c03de9fb8d3d22316ff0c47b5c18a1793bc70.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4204 -ip 4204

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4204 -s 1268

Network

Country Destination Domain Proto
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 20.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 evesecret.ma udp
GB 37.230.62.86:80 evesecret.ma tcp
US 8.8.8.8:53 86.62.230.37.in-addr.arpa udp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 98.117.19.2.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\nssA6A1.tmp

MD5 28a6676780b5dc10cce96a2b07fd2dce
SHA1 2f49455fac0d2dfa8a3b087dcd14e1c62f97c94b
SHA256 b10b2877ad9f4d77d275562f4a233c4d2900e36568d5e1761c3d92b33e050a7a
SHA512 801b2519bc90819eb45aab326909e0a3e83dd3bce7b491f3489b2be4b0d0ef947245d2fbc6fd1702436378e48ec3a6a90f1f6df43684d614aa3fecc40382fca9

C:\Users\Admin\AppData\Local\Temp\nssA6A1.tmp

MD5 6a82ea02494893b849d7b981609561e4
SHA1 c4ab8d0a95600197c0517fb0c30e4d67683efb4a
SHA256 325f317c63480734ea71c33422a2416e25a678cc45e33edd33e939ac6f5e2fd6
SHA512 86f06d769bd277e2f75c0843df79a17f878c7c4c9f5412b68ade304b7bcdc35abf6714be2aa6166230d358d007799be703ed2e673df153aa96602799009674fe

C:\Users\Admin\AppData\Local\Temp\nssA6A1.tmp

MD5 16d513397f3c1f8334e8f3e4fc49828f
SHA1 4ee15afca81ca6a13af4e38240099b730d6931f0
SHA256 d3c781a1855c8a70f5aca88d9e2c92afffa80541334731f62caa9494aa8a0c36
SHA512 4a350b790fdd2fe957e9ab48d5969b217ab19fc7f93f3774f1121a5f140ff9a9eaaa8fa30e06a9ef40ad776e698c2e65a05323c3adf84271da1716e75f5183c3

C:\Users\Admin\AppData\Local\Temp\nsiA79C.tmp\System.dll

MD5 12b140583e3273ee1f65016becea58c4
SHA1 92df24d11797fefd2e1f8d29be9dfd67c56c1ada
SHA256 014f1dfeb842cf7265a3644bc6903c592abe9049bfc7396829172d3d72c4d042
SHA512 49ffdfa1941361430b6acb3555fd3aa05e4120f28cbdf7ceaa2af5937d0b8cccd84471cf63f06f97cf203b4aa20f226bdad082e9421b8e6b62ab6e1e9fc1e68a

C:\Users\Admin\AppData\Local\Temp\nsnA7BC.tmp

MD5 e2fecc970546c3418917879fe354826c
SHA1 63f1c1dd01b87704a6b6c99fd9f141e0a3064f16
SHA256 ff91566d755f5d038ae698a2cc0a7d4d14e5273afafc37b6f03afda163768fa0
SHA512 3c4a68cbaee94f986515f43305a0e7620c14c30213d4a17db4a3e8a1b996764eb688bf733f472fc52073c2c80bb5229bb29411d7601aefe1c4370e230c341a0a

C:\Users\Admin\AppData\Local\Temp\nsnA7BC.tmp

MD5 67cfa7364c4cf265b047d87ff2e673ae
SHA1 56e27889277981a9b63fcf5b218744a125bbc2fa
SHA256 639b68bd180b47d542dd001d03557ee2d5b3065c3c783143bc9fb548f3fd7713
SHA512 17f28a136b20b89e9c3a418b08fd8e6fcaac960872dc33b2481af2d872efc44228f420759c57724f5d953c7ba98f2283e2acc7dfe5a58cbf719c6480ec7a648b

C:\Users\Admin\AppData\Local\Temp\nsnA7BC.tmp

MD5 0ec6691c283ddc7f19331d3c214c58d2
SHA1 5b30d6927130c7a3ce16dfa809238c6f6fc61e6f
SHA256 1bf567e8c29ff4bd0866da8a312c38c4c2ffabf6916a87fa7bc7bbba2b42db36
SHA512 8ea2702bd97781067bdfe3008e9aa1da303db56b8d03bd076823308d299e369b2d989708ea707b5c4a51b96d3d07001e7f0c3d9767f08933fde0f9feba28493f

C:\Users\Admin\AppData\Local\Temp\nsnA7BC.tmp

MD5 f302a24fc452fd85d13ad30a272d6f35
SHA1 3b9153f575b70084ae04fd55d5c86169eaa60916
SHA256 2edbbfdef57bac60adc902d6bd15abb9c3e044c0f660c9a63135d37ac0f6c63a
SHA512 477c3efa5d2bf5ef6ac57a0dc190014f98ff0bd1181106edff7b0db01d58b7f0d8c6eb77266202249f035cc056a726bfd7abdc2e0d672aadc9a45ed29d4b1bd0

C:\Users\Admin\AppData\Local\Temp\nsnA7BC.tmp

MD5 040cc34b899dd5230d5113b5156ec5d4
SHA1 60a49c8b3e3f33b38c1780e8826e50d9672c5bcf
SHA256 454a97bbcd88c00fd8617e38fec2ebc855a608adbb751ad5ce4355f6bd171c32
SHA512 e6d441445f20c73e6e23203323dd5ff68ac2a74767fa69aac7c2c1b05e7bd981cf461b66c9d516dc53b4bbc32117c12e103187cfca891846b9d42ee2aa2c423d

C:\Users\Admin\AppData\Local\Temp\nsdA869.tmp

MD5 9a53fc1d7126c5e7c81bb5c15b15537b
SHA1 e2d13e0fa37de4c98f30c728210d6afafbb2b000
SHA256 a7de06c22e4e67908840ec3f00ab8fe9e04ae94fb16a74136002afbaf607ff92
SHA512 b0bffbb8072dbdcfc68f0e632f727c08fe3ef936b2ef332c08486553ff2cef7b0bcdb400e421a117e977bb0fac17ce4706a8097e32d558a918433646b6d5f1a1

C:\Users\Admin\AppData\Local\Temp\nsdA869.tmp

MD5 25bc6654798eb508fa0b6343212a74fe
SHA1 15d5e1d3b948fd5986aaff7d9419b5e52c75fc93
SHA256 8e5202705183bd3a20a29e224499b0f77a8273ee33cd93cca71043c57ad4bdfc
SHA512 5868c6241ed3cfcc5c34bfe42e4b9f5c69e74975e524771d8c9f35cafc13fd01cd943ec4d8caefee79a1f4a457e69d20b7a86f88db83a5bc3e6bd8a619972898

C:\Users\Admin\AppData\Local\Temp\nsnA7BC.tmp

MD5 5d04a35d3950677049c7a0cf17e37125
SHA1 cafdd49a953864f83d387774b39b2657a253470f
SHA256 a9493973dd293917f3ebb932ab255f8cac40121707548de100d5969956bb1266
SHA512 c7b1afd95299c0712bdbc67f9d2714926d6ec9f71909af615affc400d8d2216ab76f6ac35057088836435de36e919507e1b25be87b07c911083f964eb67e003b

C:\Users\Admin\AppData\Local\Temp\nsdA869.tmp

MD5 cd0c38af71efb097ce402c588b17ff09
SHA1 8da4e54a7b95932f752a88ea416fa31d0c7c2fbe
SHA256 1630fc3705a57982a8939a6550615a92d8998f0c3394caeca0ae3019427ec50a
SHA512 03603368dbca419de6ad8ef10bb6c9670e83f06d2b3b7d7b5ebccf255473d7abb1cca1c7e0f2c2d49cd3f84c599ee5e71b03582567c95f3f76d5e54931a6ed06

C:\Users\Admin\AppData\Local\Temp\nsdA869.tmp

MD5 1a976b081f77c04dad951286222ed3da
SHA1 1fd2c47eab6b8b5ee42fee2f8238bd065881d99d
SHA256 d7c42493656ae25d5a3ff0b7fa739e43557d2c54a82833c8782ddbe8d364816d
SHA512 e087d4f397761e3525241f2610f8be1bd46533905fc0bf39435127e1341c1f4c21fc1d2f1b213d78b0505d8bafbc4f797b85537601a0f186850457d3d2847a23

C:\Users\Admin\AppData\Local\Temp\nsdA869.tmp

MD5 6784d8f3948a522353ed281328a8723d
SHA1 304028414399d878afe5700f56a26f4062cf4f9b
SHA256 e51248669d25916aaadc481c6f2661d7af87c28e30b62c34b5ed2fbb708575ac
SHA512 00a6fce062c6db06dd723aa91dd74fe9107059cd5635d0d09743f9c756bb3af1b3fb1e0b89edce081fde02fd72edd1a0590b2fb83d7711a502b0618e97e21fc5

C:\Users\Admin\AppData\Local\Temp\nsdA906.tmp

MD5 c69f9017146365e0214351f8fe3c5837
SHA1 1653405a133cee32745a9a2bffaeca4429d95532
SHA256 e7137bbf941ddb679efbbb3043769122f659a0932d056894f411b734fb1ffddd
SHA512 fa5a9dad8862c6614fd148c9800f3aec0b2a842f1f3ee47f22bbc426133bd7659bdb2cfac45d25288ea6a4c4f1b29163b8ae764c0d15c008935a7b9606c67977

C:\Users\Admin\AppData\Local\Temp\nsdA906.tmp

MD5 5d27ab64299196a0ae0588d09bbdd4af
SHA1 f60db836286953946e8108aee6de534a6892ab19
SHA256 0659be61af13ac112373100fcbe4e5cbdaec19262a104e882bec6f6389b07a5f
SHA512 50c7eb438d1babcf8883180c211bad80e73c1d9ec87a733b05ea2692c8c9d9dbd56700d82cfa679100b7eb40a7389c7f07a161c3ab0e629ffad51434676fa0b9

C:\Users\Admin\AppData\Local\Temp\nsdA906.tmp

MD5 25882c6cd51b5a0a31cb42fcd87cf247
SHA1 6eb6be260825e3807d50cf84afb990878b94faa5
SHA256 cf1663a286fa3ee325e8a2440c280bc547e653a6289b069dbff95449e6e9501a
SHA512 3d0bf304bac4dbbb09b6937ae535931113479863281d6d2ab19ccf07250bea66fab08e7027f27e77df38f2407dd7f98db1ca3879d37f5a7f367da664db41d2ac

C:\Users\Admin\AppData\Local\Temp\nsdA906.tmp

MD5 d127f9aab74c4d2d35c1c7903ae66531
SHA1 d003563f3333c1b4b8f52e935c5113e7309a1969
SHA256 4ba4336d758a991595407faf58b7ac3d1344973d3327d737bd30d6b30ac0427f
SHA512 a9cfee199d3ad828c8b953ce0f090cde68b0e7c57de417cd6f82feffa5d9432fae8ef43ecebc61aa83ebc788ff830cf1bd167b27ca1c30eab114fd7b902e1352

C:\Users\Admin\AppData\Local\Temp\nsdA906.tmp

MD5 77c74357a05c6ef6d24ab36438bf636f
SHA1 9dd3198f880b3063e935f0900372221d339accca
SHA256 a74d0f1c92645efb5aeb220ec072e273d9219b73635433a74891e139c640834c
SHA512 14b8d3dce21ba1d2ad80c4111627cd742db9b2f2612f6f94ddb542dc6d051869d31febe611129053c947f8cf158e58700e4b0a800d4ac2fd68c858a91fce056e

memory/4316-565-0x0000000077E31000-0x0000000077F51000-memory.dmp

memory/4316-566-0x0000000077E31000-0x0000000077F51000-memory.dmp

memory/4316-567-0x0000000074C95000-0x0000000074C96000-memory.dmp

memory/4204-568-0x0000000077EB8000-0x0000000077EB9000-memory.dmp

memory/4204-569-0x0000000077E31000-0x0000000077F51000-memory.dmp

memory/4204-571-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/4204-572-0x0000000000460000-0x00000000016B4000-memory.dmp

Analysis: behavioral3

Detonation Overview

Submitted

2024-11-13 02:18

Reported

2024-11-13 02:20

Platform

win7-20240903-en

Max time kernel

118s

Max time network

122s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2696 -s 220

Network

N/A

Files

N/A