Analysis
-
max time kernel
94s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2024 19:48
Static task
static1
Behavioral task
behavioral1
Sample
115b3ecabcad34213c2392e2918daa5b41a77c55d6efd5df2d33462e6054174e.dll
Resource
win7-20241023-en
General
-
Target
115b3ecabcad34213c2392e2918daa5b41a77c55d6efd5df2d33462e6054174e.dll
-
Size
456KB
-
MD5
0e75ff88cda6b552dbd7c823511e5adc
-
SHA1
c9cbbec555e7ebadfd3bbe059648dd0faf9a8e16
-
SHA256
115b3ecabcad34213c2392e2918daa5b41a77c55d6efd5df2d33462e6054174e
-
SHA512
5cd3959f2aff978c16c30d8a7134cbf5535084705e315dcc5975d223a1104bf003c9be4801743f31773920bd0963734a285274942a020efb449fb76850ef6e66
-
SSDEEP
12288:5n2QK/lGRgOUqmq9kR6lhKXPqljtOBZh+axlQP:5n2QK/cRgOnmq9g6uqKLh+emP
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2108 rundll32mgr.exe 1348 hrl9FBA.tmp 1712 dipzew.exe -
Loads dropped DLL 1 IoCs
pid Process 1712 dipzew.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe File created C:\Windows\SysWOW64\dipzew.exe hrl9FBA.tmp File opened for modification C:\Windows\SysWOW64\dipzew.exe hrl9FBA.tmp File created C:\Windows\SysWOW64\gei33.dll dipzew.exe -
resource yara_rule behavioral2/files/0x000c000000023ba0-5.dat upx behavioral2/memory/2108-7-0x0000000000400000-0x000000000045B000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 760 2108 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hrl9FBA.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dipzew.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4868 wrote to memory of 4976 4868 rundll32.exe 83 PID 4868 wrote to memory of 4976 4868 rundll32.exe 83 PID 4868 wrote to memory of 4976 4868 rundll32.exe 83 PID 4976 wrote to memory of 2108 4976 rundll32.exe 84 PID 4976 wrote to memory of 2108 4976 rundll32.exe 84 PID 4976 wrote to memory of 2108 4976 rundll32.exe 84 PID 4976 wrote to memory of 1348 4976 rundll32.exe 85 PID 4976 wrote to memory of 1348 4976 rundll32.exe 85 PID 4976 wrote to memory of 1348 4976 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\115b3ecabcad34213c2392e2918daa5b41a77c55d6efd5df2d33462e6054174e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\115b3ecabcad34213c2392e2918daa5b41a77c55d6efd5df2d33462e6054174e.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2108 -s 2644⤵
- Program crash
PID:760
-
-
-
C:\Users\Admin\AppData\Local\Temp\hrl9FBA.tmpC:\Users\Admin\AppData\Local\Temp\hrl9FBA.tmp3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1348
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2108 -ip 21081⤵PID:3732
-
C:\Windows\SysWOW64\dipzew.exeC:\Windows\SysWOW64\dipzew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
338KB
MD59e5a94f2b4b378b2f50805cdd1efe405
SHA1e56fce2eedf674218165bdf53da7943f47875835
SHA2560a7ec6b90c8c4842f8348297b3cb61ec0ed4545e6f33a07089c9470ead25570b
SHA51221d8095183bfbc582a829af2c1f35c07ce2ebb120bece797f6e067f7c69c86beeaf7911f447d33540290504a8ad0318041743ee17ba2df3099b2729841a22827
-
Filesize
9KB
MD5655d12e373b5891981111e48da1f0a88
SHA1db346a8879c226b2a6fb13300a8cccb089326b04
SHA2563eecef36be5dcb9c81ebbbd2eb0bdcd456d81592673fae46f043d5423b8d7748
SHA5120a27696905df67638e43ae479e376f89657475675711c9d1b292da629520cc36dfafca12232308b232a7ccc3e9e47b39baf1b9d0b597c8d1c6946aa827aaeeea
-
Filesize
106KB
MD5db92102c142a97620d0f02b3321d235b
SHA184adf0da0cfa131b61a23cf26719b5d0c75702a9
SHA25612dc8f962b54cbf925146db55709c9ad8465e392aede3a5095f74e7ca6ade2a5
SHA51204bbb8ca5e5e63e85da4c4a9de8f46352cb9437005c0cae014da1d61c58916584a284fb7fba21b06f963de440362e150b6f2ef5d69143fd6a187c0712bf28d65