Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 02:55
Static task
static1
Behavioral task
behavioral1
Sample
0620ab84a45ac413a3ce956eaf04c3a5ac8bc20983c4d3ddfc4a1ef18b2bddeb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0620ab84a45ac413a3ce956eaf04c3a5ac8bc20983c4d3ddfc4a1ef18b2bddeb.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/fqfwqcrlvs.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/fqfwqcrlvs.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/fqfwqcrlvs.dll
-
Size
48KB
-
MD5
2dcfaed029e76d404de8c562e9618fc3
-
SHA1
ad586f14bf71ea471905da2e424e872432f60d5e
-
SHA256
54e000d6cbf51dbda212135ecaeae42da9bbd5e4d42bfe472c1df975308ef4ec
-
SHA512
953da849e7f926ff617a9aca550bda7693b66a58a86da4ae202d4423a926a0d0adfaf7331d9ca113f0f5c867ebaa703f467b642e2ac3735ba811868cebf0427a
-
SSDEEP
768:n/7Fk2J334zzF1UJ+Eyp/VBdnU/4tK+Fg4JvXQxkAUQxg9q:n/7XVIzzF12+EsdnW4I+FJJ/Qx0lq
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4396 1396 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 688 wrote to memory of 1396 688 rundll32.exe 82 PID 688 wrote to memory of 1396 688 rundll32.exe 82 PID 688 wrote to memory of 1396 688 rundll32.exe 82 PID 1396 wrote to memory of 2132 1396 rundll32.exe 83 PID 1396 wrote to memory of 2132 1396 rundll32.exe 83 PID 1396 wrote to memory of 2132 1396 rundll32.exe 83 PID 1396 wrote to memory of 2132 1396 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\fqfwqcrlvs.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\fqfwqcrlvs.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\fqfwqcrlvs.dll,#13⤵PID:2132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 7403⤵
- Program crash
PID:4396
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 1396 -ip 13961⤵PID:4008