Analysis

  • max time kernel
    1167s
  • max time network
    1179s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-de
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-delocale:de-deos:windows10-ltsc 2021-x64systemwindows
  • submitted
    17/11/2024, 11:38

General

  • Target

    $PLUGINSDIR/sqlite3.dll

  • Size

    1.1MB

  • MD5

    b8074421d9f92adb9d112b90a54d47d1

  • SHA1

    97eecbb5adb3d75d7ba791fc8625611e8854ee6e

  • SHA256

    8ce20d2f27c6574dcaed648971778bb11d1ec18b9a44e879c0e53c1a29273dd8

  • SHA512

    bef2881cd618c7a8a5871e6f58032ae81225f02bd005355d00ef6b05c30e2a8112763ec1cb0474f1f3fb93d43b8609070d0daf33f0b9fdb92196e1c5fae4213b

  • SSDEEP

    24576:7vcPcj5w8pcoCGlopTOF+mqpWEWkDOL97iMYG:7NNVcylooLqpWEW2Uxb

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\sqlite3.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:64
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\sqlite3.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2188
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 600
        3⤵
        • Program crash
        PID:2008
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2188 -ip 2188
    1⤵
      PID:3652

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2188-0-0x0000000061E00000-0x0000000061EF8000-memory.dmp

      Filesize

      992KB