Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2024 01:01
Static task
static1
Behavioral task
behavioral1
Sample
AdbWinApi.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
AdbWinApi.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
adb.exe
Resource
win7-20240903-en
General
-
Target
AdbWinApi.dll
-
Size
39KB
-
MD5
ee5aca085318338c4d9ca42dae966b0c
-
SHA1
b47fef6dbb5982b4159533ee1dfecef6c285a262
-
SHA256
7050084c99d02f2e837207bff7a13a261d5435589771e9dc3f0db38841b97942
-
SHA512
3e8bedb69537cb0d809e63b8bad79b533d8ab2862d282d4ef331171331ce53aba8389886689c866ee3e5cf5568e17303d8c485e40914067c183aa729131255a0
-
SSDEEP
384:SmX2Gj6sdipcJvy22fYPZaTh8T5e6OITkhUeKlrt+1nu6EDHvxtdn1XoNCLyOMk9:SFQyPghaQeITkhhWBmnTED5bLyRyu5
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2624 2316 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1648 wrote to memory of 2316 1648 rundll32.exe 83 PID 1648 wrote to memory of 2316 1648 rundll32.exe 83 PID 1648 wrote to memory of 2316 1648 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\AdbWinApi.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\AdbWinApi.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2316 -s 6003⤵
- Program crash
PID:2624
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2316 -ip 23161⤵PID:3532