Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-11-2024 01:01
Static task
static1
Behavioral task
behavioral1
Sample
AdbWinApi.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
AdbWinApi.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
adb.exe
Resource
win7-20240903-en
General
-
Target
AdbWinApi.dll
-
Size
39KB
-
MD5
ee5aca085318338c4d9ca42dae966b0c
-
SHA1
b47fef6dbb5982b4159533ee1dfecef6c285a262
-
SHA256
7050084c99d02f2e837207bff7a13a261d5435589771e9dc3f0db38841b97942
-
SHA512
3e8bedb69537cb0d809e63b8bad79b533d8ab2862d282d4ef331171331ce53aba8389886689c866ee3e5cf5568e17303d8c485e40914067c183aa729131255a0
-
SSDEEP
384:SmX2Gj6sdipcJvy22fYPZaTh8T5e6OITkhUeKlrt+1nu6EDHvxtdn1XoNCLyOMk9:SFQyPghaQeITkhhWBmnTED5bLyRyu5
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2384 2112 WerFault.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2724 wrote to memory of 2112 2724 rundll32.exe rundll32.exe PID 2724 wrote to memory of 2112 2724 rundll32.exe rundll32.exe PID 2724 wrote to memory of 2112 2724 rundll32.exe rundll32.exe PID 2724 wrote to memory of 2112 2724 rundll32.exe rundll32.exe PID 2724 wrote to memory of 2112 2724 rundll32.exe rundll32.exe PID 2724 wrote to memory of 2112 2724 rundll32.exe rundll32.exe PID 2724 wrote to memory of 2112 2724 rundll32.exe rundll32.exe PID 2112 wrote to memory of 2384 2112 rundll32.exe WerFault.exe PID 2112 wrote to memory of 2384 2112 rundll32.exe WerFault.exe PID 2112 wrote to memory of 2384 2112 rundll32.exe WerFault.exe PID 2112 wrote to memory of 2384 2112 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\AdbWinApi.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\AdbWinApi.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2112 -s 2203⤵
- Program crash
PID:2384
-
-