Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/11/2024, 19:06
Behavioral task
behavioral1
Sample
de3dd09eeefc48a02355c4de3bf4d98cda78231ef99435ec466544114d10e0aa.dll
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
de3dd09eeefc48a02355c4de3bf4d98cda78231ef99435ec466544114d10e0aa.dll
-
Size
76KB
-
MD5
a8038633f7682424b45050b5175fdedb
-
SHA1
90f8edf4e88353492e153a9b465e30c4ebd33a70
-
SHA256
de3dd09eeefc48a02355c4de3bf4d98cda78231ef99435ec466544114d10e0aa
-
SHA512
e3ddbce6c2a7b314cad5cf0e73f405382fe11ea2c95cf2ed2914732071a309d54b629355ea26a8a06d5d95c3eeb7a212c024bf77208124fa5e0d89e38134d61b
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZpEhJu:c8y93KQjy7G55riF1cMo03Au
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2184-2-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2184-3-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2184-1-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2184-4-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2704 2184 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2184 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2184 2224 rundll32.exe 30 PID 2224 wrote to memory of 2184 2224 rundll32.exe 30 PID 2224 wrote to memory of 2184 2224 rundll32.exe 30 PID 2224 wrote to memory of 2184 2224 rundll32.exe 30 PID 2224 wrote to memory of 2184 2224 rundll32.exe 30 PID 2224 wrote to memory of 2184 2224 rundll32.exe 30 PID 2224 wrote to memory of 2184 2224 rundll32.exe 30 PID 2184 wrote to memory of 2704 2184 rundll32.exe 31 PID 2184 wrote to memory of 2704 2184 rundll32.exe 31 PID 2184 wrote to memory of 2704 2184 rundll32.exe 31 PID 2184 wrote to memory of 2704 2184 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\de3dd09eeefc48a02355c4de3bf4d98cda78231ef99435ec466544114d10e0aa.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\de3dd09eeefc48a02355c4de3bf4d98cda78231ef99435ec466544114d10e0aa.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2184 -s 3283⤵
- Program crash
PID:2704
-
-