Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 15:36
Static task
static1
Behavioral task
behavioral1
Sample
05d452048449f86144cce66abc03d54a8e9d0eb10ddaba06b58799f1fe5d7c6aN.dll
Resource
win7-20241023-en
General
-
Target
05d452048449f86144cce66abc03d54a8e9d0eb10ddaba06b58799f1fe5d7c6aN.dll
-
Size
170KB
-
MD5
484d15e963b3895714de38da279c94d0
-
SHA1
440e800883c261e39a27f4706cb727bac86a67e3
-
SHA256
05d452048449f86144cce66abc03d54a8e9d0eb10ddaba06b58799f1fe5d7c6a
-
SHA512
42ce513975eaa320096b0ffb808040447b6f43160a970b1445d4fd6ec35b5aae361ffade935c008fe101bc627e43596b50e879731ab530a7810dec84f9443129
-
SSDEEP
3072:bcwO/iTOdgWtJ6LCHn/rkiENpYrvQaSISixCC/xwp2rrUDg:bDTOdgWtYAjkR/YrvQaSrcwptDg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
rundll32mgr.exepid process 4404 rundll32mgr.exe -
Drops file in System32 directory 1 IoCs
Processes:
rundll32.exedescription ioc process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Processes:
resource yara_rule C:\Windows\SysWOW64\rundll32mgr.exe upx behavioral2/memory/4404-8-0x0000000000400000-0x0000000000477000-memory.dmp upx behavioral2/memory/4404-11-0x0000000000400000-0x0000000000477000-memory.dmp upx -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1808 4404 WerFault.exe rundll32mgr.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exerundll32mgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
rundll32.exedescription pid process Token: SeDebugPrivilege 2428 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 3676 wrote to memory of 2428 3676 rundll32.exe rundll32.exe PID 3676 wrote to memory of 2428 3676 rundll32.exe rundll32.exe PID 3676 wrote to memory of 2428 3676 rundll32.exe rundll32.exe PID 2428 wrote to memory of 4404 2428 rundll32.exe rundll32mgr.exe PID 2428 wrote to memory of 4404 2428 rundll32.exe rundll32mgr.exe PID 2428 wrote to memory of 4404 2428 rundll32.exe rundll32mgr.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\05d452048449f86144cce66abc03d54a8e9d0eb10ddaba06b58799f1fe5d7c6aN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\05d452048449f86144cce66abc03d54a8e9d0eb10ddaba06b58799f1fe5d7c6aN.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 2644⤵
- Program crash
PID:1808
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4404 -ip 44041⤵PID:3488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5774b9c11bcc0dbf50425e3935100b905
SHA1519338139ca0deaa4b42e056468087e18fd1f253
SHA256be6cab2cfd23bd5cd633264eb9a7d55f0feacda3aff05db031af04a531585590
SHA5126d9a570b441f96013bc5ae2bdc6422beb0f48c3953da00e2443e94de531f8abda9ad8403380543f95e0ac16d84985e1a5829556ff7bf26fca85afbc86fc07872