Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13-11-2024 07:30
Static task
static1
Behavioral task
behavioral1
Sample
61d6353b7bd72d5b604aaaeef3a0124b9cf48fe4c0411110be06380ffc868e57N.dll
Resource
win7-20241010-en
General
-
Target
61d6353b7bd72d5b604aaaeef3a0124b9cf48fe4c0411110be06380ffc868e57N.dll
-
Size
1.1MB
-
MD5
a13748b16a770a39f8ae91a67ad41d00
-
SHA1
3d7592a897e6ee1182f64ab5ad66025c92316975
-
SHA256
61d6353b7bd72d5b604aaaeef3a0124b9cf48fe4c0411110be06380ffc868e57
-
SHA512
4b533e426f472521fc1e94cb8b844a81e0af564a4a67c605368dedf6fce63b4af2ad828ba43f04fed799ff234996025be195a573367c94987f134f05c075f3d8
-
SSDEEP
12288:oQKUdt6c95KR0a0CombAxzSlP72FNIbfQlu6v46H8MNOC3L1wNot54zS5fuRDo29:oQK+kc9kT0CxySlT8NIBCt5KWADo2rfR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2952 rundll32mgr.exe -
Loads dropped DLL 9 IoCs
pid Process 2904 rundll32.exe 2904 rundll32.exe 2088 WerFault.exe 2088 WerFault.exe 2088 WerFault.exe 2088 WerFault.exe 2088 WerFault.exe 2088 WerFault.exe 2088 WerFault.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2088 2952 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2904 2880 rundll32.exe 30 PID 2880 wrote to memory of 2904 2880 rundll32.exe 30 PID 2880 wrote to memory of 2904 2880 rundll32.exe 30 PID 2880 wrote to memory of 2904 2880 rundll32.exe 30 PID 2880 wrote to memory of 2904 2880 rundll32.exe 30 PID 2880 wrote to memory of 2904 2880 rundll32.exe 30 PID 2880 wrote to memory of 2904 2880 rundll32.exe 30 PID 2904 wrote to memory of 2952 2904 rundll32.exe 31 PID 2904 wrote to memory of 2952 2904 rundll32.exe 31 PID 2904 wrote to memory of 2952 2904 rundll32.exe 31 PID 2904 wrote to memory of 2952 2904 rundll32.exe 31 PID 2952 wrote to memory of 2088 2952 rundll32mgr.exe 32 PID 2952 wrote to memory of 2088 2952 rundll32mgr.exe 32 PID 2952 wrote to memory of 2088 2952 rundll32mgr.exe 32 PID 2952 wrote to memory of 2088 2952 rundll32mgr.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\61d6353b7bd72d5b604aaaeef3a0124b9cf48fe4c0411110be06380ffc868e57N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\61d6353b7bd72d5b604aaaeef3a0124b9cf48fe4c0411110be06380ffc868e57N.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 1004⤵
- Loads dropped DLL
- Program crash
PID:2088
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
103KB
MD50ff8c1c8de1f818a51512f4d894e30d1
SHA1bd99a343ea5ca5ebdd7207651478a8425054716a
SHA2567cc54785e229b1605103e3219969939eb80f106e9edca3cb380917ac33526d28
SHA512da23767aa25ba5c1bb55c338fa82b1b60853c83fd1e4af28cc023fdd1405b46717bc58137d7bfe7a3a581dcd23de0520ab6ace88434b8cf35b3a0278f516dfd2