Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 18:02
Behavioral task
behavioral1
Sample
6afa7cf4f9c0b6e63b2b3a9235bfce5b5b0490f528286a732c9bc93364b91de4.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6afa7cf4f9c0b6e63b2b3a9235bfce5b5b0490f528286a732c9bc93364b91de4.dll
Resource
win10v2004-20241007-en
General
-
Target
6afa7cf4f9c0b6e63b2b3a9235bfce5b5b0490f528286a732c9bc93364b91de4.dll
-
Size
119KB
-
MD5
acfddb14cbc254e25473db79bd48f262
-
SHA1
0e2dbcc5a0afeefeaccf98971deefedfa54c278d
-
SHA256
6afa7cf4f9c0b6e63b2b3a9235bfce5b5b0490f528286a732c9bc93364b91de4
-
SHA512
37f5799f7e8d55c483ddc0867bed76b239eec5d1ec893a1b4d3777fafefc10e171efc509e3fb8da63003097399f0888eb5c2112b2ffcb4e2c9546a383a44cfc7
-
SSDEEP
3072:3tBUrtKEPjCGCTtJ1HPdm0TBfoDfl1ZQ4:ArtKEPvChJNP40TBgDxX
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4340 2644 WerFault.exe regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
regsvr32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 2644 regsvr32.exe 2644 regsvr32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid process target process PID 4568 wrote to memory of 2644 4568 regsvr32.exe regsvr32.exe PID 4568 wrote to memory of 2644 4568 regsvr32.exe regsvr32.exe PID 4568 wrote to memory of 2644 4568 regsvr32.exe regsvr32.exe PID 2644 wrote to memory of 1076 2644 regsvr32.exe explorer.exe PID 2644 wrote to memory of 1076 2644 regsvr32.exe explorer.exe PID 2644 wrote to memory of 1076 2644 regsvr32.exe explorer.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\6afa7cf4f9c0b6e63b2b3a9235bfce5b5b0490f528286a732c9bc93364b91de4.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\6afa7cf4f9c0b6e63b2b3a9235bfce5b5b0490f528286a732c9bc93364b91de4.dll2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵PID:1076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 7523⤵
- Program crash
PID:4340
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2644 -ip 26441⤵PID:2132