Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-11-2024 01:01
Static task
static1
Behavioral task
behavioral1
Sample
AdbWinApi.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
AdbWinApi.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
adb.exe
Resource
win7-20240903-en
General
-
Target
AdbWinApi.dll
-
Size
39KB
-
MD5
ee5aca085318338c4d9ca42dae966b0c
-
SHA1
b47fef6dbb5982b4159533ee1dfecef6c285a262
-
SHA256
7050084c99d02f2e837207bff7a13a261d5435589771e9dc3f0db38841b97942
-
SHA512
3e8bedb69537cb0d809e63b8bad79b533d8ab2862d282d4ef331171331ce53aba8389886689c866ee3e5cf5568e17303d8c485e40914067c183aa729131255a0
-
SSDEEP
384:SmX2Gj6sdipcJvy22fYPZaTh8T5e6OITkhUeKlrt+1nu6EDHvxtdn1XoNCLyOMk9:SFQyPghaQeITkhhWBmnTED5bLyRyu5
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2384 2112 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2724 wrote to memory of 2112 2724 rundll32.exe 31 PID 2724 wrote to memory of 2112 2724 rundll32.exe 31 PID 2724 wrote to memory of 2112 2724 rundll32.exe 31 PID 2724 wrote to memory of 2112 2724 rundll32.exe 31 PID 2724 wrote to memory of 2112 2724 rundll32.exe 31 PID 2724 wrote to memory of 2112 2724 rundll32.exe 31 PID 2724 wrote to memory of 2112 2724 rundll32.exe 31 PID 2112 wrote to memory of 2384 2112 rundll32.exe 32 PID 2112 wrote to memory of 2384 2112 rundll32.exe 32 PID 2112 wrote to memory of 2384 2112 rundll32.exe 32 PID 2112 wrote to memory of 2384 2112 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\AdbWinApi.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\AdbWinApi.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2112 -s 2203⤵
- Program crash
PID:2384
-
-