Analysis
-
max time kernel
92s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 20:50
Static task
static1
Behavioral task
behavioral1
Sample
eac0e02e03151eaf9940a958be62651ead42186cce55f0237e7563f3825b99caN.dll
Resource
win7-20240903-en
General
-
Target
eac0e02e03151eaf9940a958be62651ead42186cce55f0237e7563f3825b99caN.dll
-
Size
1.7MB
-
MD5
cfbac8afd00384dc7d102e1ff25aa560
-
SHA1
f572d6c298f2ac4bca204405a697bdd4002ce969
-
SHA256
eac0e02e03151eaf9940a958be62651ead42186cce55f0237e7563f3825b99ca
-
SHA512
6145db7f9fd79c3f220a5bae3666f66ae05f397c84c83f93c35daccbdbe509e9c3cd88fda8fbe3e6008cf7ac452b18f7829883a7e42b2c2528a1cec8bf68caf6
-
SSDEEP
49152:0i6dS8Mj8NZMtBaw9zOmKgvp0UqopXrjarE/PUWMmPuu/mPG6n+4QvSBb:SS8MQMtBaw9SmKgvp0UqoBmrE/PUgj/4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1076 rundll32mgr.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
resource yara_rule behavioral2/files/0x000d000000023b5c-2.dat upx behavioral2/memory/1076-4-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral2/memory/1076-8-0x0000000000400000-0x0000000000469000-memory.dmp upx -
Program crash 2 IoCs
pid pid_target Process procid_target 4848 736 WerFault.exe 83 2444 1076 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1288 wrote to memory of 736 1288 rundll32.exe 83 PID 1288 wrote to memory of 736 1288 rundll32.exe 83 PID 1288 wrote to memory of 736 1288 rundll32.exe 83 PID 736 wrote to memory of 1076 736 rundll32.exe 84 PID 736 wrote to memory of 1076 736 rundll32.exe 84 PID 736 wrote to memory of 1076 736 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eac0e02e03151eaf9940a958be62651ead42186cce55f0237e7563f3825b99caN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eac0e02e03151eaf9940a958be62651ead42186cce55f0237e7563f3825b99caN.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1076 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1076 -s 2644⤵
- Program crash
PID:2444
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 736 -s 6803⤵
- Program crash
PID:4848
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 736 -ip 7361⤵PID:4596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1076 -ip 10761⤵PID:4824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182KB
MD5dd49909ad6ea1964c51570dc8e0509d0
SHA18b0b696306389efe29328520f7982ccbf8aa02ba
SHA2561ba4e1899aee0c9f3b3298984afd793bb7a8b838fd7d56f4f9584a285354f1c2
SHA51286b8043cd378ba8f1d42f170330df08fc31980c400149b1e624a1d2e6928e6248ce805213b993662b8f99a9480ab07a2c4d077002f48a79709e3d21c3ad1ca76