Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2024 19:41

General

  • Target

    lemurs.dll

  • Size

    20KB

  • MD5

    349ff55e70ed9a44611e9585aea44481

  • SHA1

    65ef1354579103c4e87c2ffca5270e36e5d6bf2c

  • SHA256

    27d8323ca50e040da96f71b273b7482026d65bf5ac83bacf817b432f7c3a7279

  • SHA512

    54bd9e9b67cae56040376d2eb1fde9e58b31d6da3efe360b14cfc5069d5728d3777c41eb3f389db928b31cb0a6fd9f2e3bbb25cd41891754d8bec350cadf8d57

  • SSDEEP

    384:b0S8J+CWb2Y2l6/5ClfxB8RkJCzqTAO0r8ifHO2v/uMjzFnmPlLmoxuTHNt:b0S8J+Zb2Y2l6/5ClfxB8RkJCgAO0r82

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\lemurs.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5116
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\lemurs.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:5092
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 552
        3⤵
        • Program crash
        PID:1612
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5092 -ip 5092
    1⤵
      PID:1052

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads