Analysis
-
max time kernel
148s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 09:33
Static task
static1
Behavioral task
behavioral1
Sample
72f68fe89853d3bf944ff39083bd86d7e6511724cf1a0414b4ee3f79f11a3df6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
72f68fe89853d3bf944ff39083bd86d7e6511724cf1a0414b4ee3f79f11a3df6.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/lcfqe.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/lcfqe.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/lcfqe.dll
-
Size
48KB
-
MD5
849b29a5363106f1ec41b2b6bfce6b6d
-
SHA1
bfdccdb25cbcf5bb55e42169f542513dd6881139
-
SHA256
e3dfe132ec3fcfcbb1146154212ba1b1c4221cea1b79cded3cab7fc65c3cc54b
-
SHA512
28d568102227e1e3c12ff91dff5a8dc1c119d8d21c062706f8a5e561da09b089c284feaa49040fbadc7e1ff911563c7fdd13866af67a1c8256cd44af312f5074
-
SSDEEP
768:Fg7dbS3GVz7e1MPkrtzs5tjUKH1KJpdxCBrhLxCKFU:Fg7+0z7e1IkRwjrHAvdwBr9xCK2
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 4024 5092 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exerundll32.exedescription pid Process procid_target PID 3532 wrote to memory of 5092 3532 rundll32.exe 83 PID 3532 wrote to memory of 5092 3532 rundll32.exe 83 PID 3532 wrote to memory of 5092 3532 rundll32.exe 83 PID 5092 wrote to memory of 4420 5092 rundll32.exe 84 PID 5092 wrote to memory of 4420 5092 rundll32.exe 84 PID 5092 wrote to memory of 4420 5092 rundll32.exe 84 PID 5092 wrote to memory of 4420 5092 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\lcfqe.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\lcfqe.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\lcfqe.dll,#13⤵PID:4420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 7123⤵
- Program crash
PID:4024
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5092 -ip 50921⤵PID:3568