Analysis
-
max time kernel
6s -
platform
windows11-21h2_x64 -
resource
win11-20241007-de -
submitted
17/11/2024, 21:08
Behavioral task
behavioral1
Sample
fagality.dll
Resource
win11-20241007-de
3 signatures
300 seconds
General
-
Target
fagality.dll
-
Size
36.2MB
-
MD5
36a3ff324f2fe1a9e71f40bf575c936c
-
SHA1
f1ef1d289021000c2f742e7b38518bb0fdbde905
-
SHA256
74a00336a08201483ce04dc30891b077b614cd5023336efac17a5aaa9ddd8b8e
-
SHA512
d4a3753e3261239a45ff54091274c4eafda834387eb7221bd0aa6b6a2d8170f9ba68d07c623903a562ef5f07aff51bfbc214bc93771396027ebba2c1a0e06b2d
-
SSDEEP
393216:w/SBskEyrtN+zJkGsF20dH5ZXtpKjzw1QxgvLqmNAmjpy:UArtN+zJkGsF2OZZXuv4GcLjp
Score
3/10
Malware Config
Signatures
-
Program crash 2 IoCs
pid pid_target Process procid_target 2756 2752 WerFault.exe 77 2368 2752 WerFault.exe 77 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5084 wrote to memory of 2752 5084 rundll32.exe 77 PID 5084 wrote to memory of 2752 5084 rundll32.exe 77 PID 5084 wrote to memory of 2752 5084 rundll32.exe 77
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fagality.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fagality.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2752 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 4843⤵
- Program crash
PID:2756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 5203⤵
- Program crash
PID:2368
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2752 -ip 27521⤵PID:4492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2752 -ip 27521⤵PID:3444