Analysis
-
max time kernel
93s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 21:16
Static task
static1
Behavioral task
behavioral1
Sample
1741b050332dd1a6189cb5f6367a198d4528edafff28b1b71930ec2acb385830.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
1741b050332dd1a6189cb5f6367a198d4528edafff28b1b71930ec2acb385830.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/zntsolrgxs.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/zntsolrgxs.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/zntsolrgxs.dll
-
Size
38KB
-
MD5
fe76b0ef249aebd98f82d6437721c047
-
SHA1
b1d40595e05da9c6f8627885b36177d4ecd54f21
-
SHA256
39724fa50de7a8937dec84a3f00fe23c9dea895d312bdce8133db18f15ee1a81
-
SHA512
abff3bc26f23c3c864bca8bb4ef1191278bb88bf5d604db949a822fc98525bcecdc21acceffbca1aae5557c8a13e9e15092837bc1c16b3ec2d03c6b3fc8fd725
-
SSDEEP
384:429M1kCo19eJhv2BqFKrtR1836QF0q5knzxRCT+7BoY3Vq5b1520IVXOFCfl:4rQ19eJhDFKJ7arF0gkpoY3w5baVMA
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 4696 3936 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exerundll32.exedescription pid Process procid_target PID 4408 wrote to memory of 3936 4408 rundll32.exe 83 PID 4408 wrote to memory of 3936 4408 rundll32.exe 83 PID 4408 wrote to memory of 3936 4408 rundll32.exe 83 PID 3936 wrote to memory of 3260 3936 rundll32.exe 84 PID 3936 wrote to memory of 3260 3936 rundll32.exe 84 PID 3936 wrote to memory of 3260 3936 rundll32.exe 84 PID 3936 wrote to memory of 3260 3936 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\zntsolrgxs.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\zntsolrgxs.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\zntsolrgxs.dll,#13⤵PID:3260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3936 -s 6883⤵
- Program crash
PID:4696
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3936 -ip 39361⤵PID:4712