Analysis
-
max time kernel
62s -
max time network
67s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 16:15
Static task
static1
Behavioral task
behavioral1
Sample
beks.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
beks.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
cr.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
cr.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
psiniziale.ps1
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
psiniziale.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
zukaz.ps1
Resource
win7-20240903-en
General
-
Target
cr.dll
-
Size
5.7MB
-
MD5
2a53c7f50b074db464f7dacfcbad3be8
-
SHA1
37061b97ecf311c6165832293f55928fc31dd0c4
-
SHA256
ee5c5dd1aee927a6bcb8e390a0d2c5adcda66da5ec9e7d41b22014dd3181e793
-
SHA512
2384285ebbcc43a409f4cbec20e7e129502804683b1274d1a087e83289523fa9ba6b74243eaa96bd051fb072e16facc5bbbffde818aaa2857cd66463c43199b2
-
SSDEEP
98304:Mvl890Fp9GavfikQQd0aR+AGEAyhjSOwTZL5JLaKl4b9t8ckijA1BsF6Pe6M1N2N:Mvl890FGifikQQd0aR+AGEAyhjSOwTZV
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2120 2380 WerFault.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3556 wrote to memory of 2380 3556 rundll32.exe rundll32.exe PID 3556 wrote to memory of 2380 3556 rundll32.exe rundll32.exe PID 3556 wrote to memory of 2380 3556 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cr.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cr.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 7403⤵
- Program crash
PID:2120
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2380 -ip 23801⤵PID:5064