Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:21
Static task
static1
Behavioral task
behavioral1
Sample
PO#11112100012.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
PO#11112100012.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/jdzq.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/jdzq.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/jdzq.dll
-
Size
34KB
-
MD5
3cbfaabed5bfdf7ba91b2239ff4f54ae
-
SHA1
f135231f2966ef23161b8744cf5c4d321234d1e0
-
SHA256
369665e2448df9c8a1dce71ca14a508f4767ee7b4a141a39d662fff5a523a1a3
-
SHA512
a4a9bddc5d0c805f15974dc5b975196f9af26fdf8285c6d7ffbdcb22f3529d44863e8616cb33167f0b3a456e07cbd71fae3916b1c0c792317f36b90565e6184d
-
SSDEEP
768:F+Fegdn2Nn9Zee2WcRUHx7cLemtcuRAoTGgV:FXggN943WcRywem+uRAoKgV
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1976 1120 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1412 wrote to memory of 1120 1412 rundll32.exe 85 PID 1412 wrote to memory of 1120 1412 rundll32.exe 85 PID 1412 wrote to memory of 1120 1412 rundll32.exe 85 PID 1120 wrote to memory of 1832 1120 rundll32.exe 86 PID 1120 wrote to memory of 1832 1120 rundll32.exe 86 PID 1120 wrote to memory of 1832 1120 rundll32.exe 86 PID 1120 wrote to memory of 1832 1120 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\jdzq.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\jdzq.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\jdzq.dll,#13⤵PID:1832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 7003⤵
- Program crash
PID:1976
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1120 -ip 11201⤵PID:4004