Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 17:02
Behavioral task
behavioral1
Sample
3466219bac0ada63506bdc09227a1d0688d7eb8cab1ce3a126806b1a35259c9eN.dll
Resource
win7-20240903-en
windows7-x64
6 signatures
120 seconds
General
-
Target
3466219bac0ada63506bdc09227a1d0688d7eb8cab1ce3a126806b1a35259c9eN.dll
-
Size
76KB
-
MD5
572f5b779138243154a68d216504c9d0
-
SHA1
dd3825d987e50ed0da8a3c4fcd2c5c55b46453d7
-
SHA256
3466219bac0ada63506bdc09227a1d0688d7eb8cab1ce3a126806b1a35259c9e
-
SHA512
621dcecdbf93a9f47d7d97867e18f493aff20ca65e5b7f6296edee7464ae2cf3c34346733b35678fa2b37f72e7158bebabc3b383de4da9749c4b2f00a87f0469
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZkCa0XWP:c8y93KQjy7G55riF1cMo03SD0X+
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1560-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/1560-2-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4204 1560 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1560 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 560 wrote to memory of 1560 560 rundll32.exe 83 PID 560 wrote to memory of 1560 560 rundll32.exe 83 PID 560 wrote to memory of 1560 560 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3466219bac0ada63506bdc09227a1d0688d7eb8cab1ce3a126806b1a35259c9eN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3466219bac0ada63506bdc09227a1d0688d7eb8cab1ce3a126806b1a35259c9eN.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1560 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 7003⤵
- Program crash
PID:4204
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 1560 -ip 15601⤵PID:3948