Analysis
-
max time kernel
96s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 02:52
Static task
static1
Behavioral task
behavioral1
Sample
0620ab84a45ac413a3ce956eaf04c3a5ac8bc20983c4d3ddfc4a1ef18b2bddeb.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
0620ab84a45ac413a3ce956eaf04c3a5ac8bc20983c4d3ddfc4a1ef18b2bddeb.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/fqfwqcrlvs.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/fqfwqcrlvs.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/fqfwqcrlvs.dll
-
Size
48KB
-
MD5
2dcfaed029e76d404de8c562e9618fc3
-
SHA1
ad586f14bf71ea471905da2e424e872432f60d5e
-
SHA256
54e000d6cbf51dbda212135ecaeae42da9bbd5e4d42bfe472c1df975308ef4ec
-
SHA512
953da849e7f926ff617a9aca550bda7693b66a58a86da4ae202d4423a926a0d0adfaf7331d9ca113f0f5c867ebaa703f467b642e2ac3735ba811868cebf0427a
-
SSDEEP
768:n/7Fk2J334zzF1UJ+Eyp/VBdnU/4tK+Fg4JvXQxkAUQxg9q:n/7XVIzzF12+EsdnW4I+FJJ/Qx0lq
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4044 2384 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1772 wrote to memory of 2384 1772 rundll32.exe 83 PID 1772 wrote to memory of 2384 1772 rundll32.exe 83 PID 1772 wrote to memory of 2384 1772 rundll32.exe 83 PID 2384 wrote to memory of 4920 2384 rundll32.exe 84 PID 2384 wrote to memory of 4920 2384 rundll32.exe 84 PID 2384 wrote to memory of 4920 2384 rundll32.exe 84 PID 2384 wrote to memory of 4920 2384 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\fqfwqcrlvs.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\fqfwqcrlvs.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\fqfwqcrlvs.dll,#13⤵PID:4920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 7403⤵
- Program crash
PID:4044
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2384 -ip 23841⤵PID:1236