Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 21:53
Behavioral task
behavioral1
Sample
3929a3a2bbe2c7115502ed69deb812f551dcb44432ac367010b278a01364f26c.dll
Resource
win7-20241023-en
General
-
Target
3929a3a2bbe2c7115502ed69deb812f551dcb44432ac367010b278a01364f26c.dll
-
Size
76KB
-
MD5
69ecf15ffc8228d56b1d78441b0c9423
-
SHA1
c8705949f088e623021f28858f8fcdd532ac495a
-
SHA256
3929a3a2bbe2c7115502ed69deb812f551dcb44432ac367010b278a01364f26c
-
SHA512
024d9019a368be2372013bb4d5ac5ec645d7a62e58b156b1483967513921964184cce4dc0cc40c550667c1d3220d56ce99d154227168f4827fc5c8484d5c77f1
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZeXVpx+:c8y93KQjy7G55riF1cMo030VD+
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2592-2-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2592-1-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2592-3-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2592-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2592-5-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 1736 2592 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
rundll32.exedescription pid Process Token: SeDebugPrivilege 2592 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid Process procid_target PID 2624 wrote to memory of 2592 2624 rundll32.exe 30 PID 2624 wrote to memory of 2592 2624 rundll32.exe 30 PID 2624 wrote to memory of 2592 2624 rundll32.exe 30 PID 2624 wrote to memory of 2592 2624 rundll32.exe 30 PID 2624 wrote to memory of 2592 2624 rundll32.exe 30 PID 2624 wrote to memory of 2592 2624 rundll32.exe 30 PID 2624 wrote to memory of 2592 2624 rundll32.exe 30 PID 2592 wrote to memory of 1736 2592 rundll32.exe 31 PID 2592 wrote to memory of 1736 2592 rundll32.exe 31 PID 2592 wrote to memory of 1736 2592 rundll32.exe 31 PID 2592 wrote to memory of 1736 2592 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3929a3a2bbe2c7115502ed69deb812f551dcb44432ac367010b278a01364f26c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3929a3a2bbe2c7115502ed69deb812f551dcb44432ac367010b278a01364f26c.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2592 -s 2683⤵
- Program crash
PID:1736
-
-