Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10/12/2024, 21:00
Behavioral task
behavioral1
Sample
0476a150214207c0a78a2dde516888cc96b7648fb84efe654dc0d6b49f08152bN.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0476a150214207c0a78a2dde516888cc96b7648fb84efe654dc0d6b49f08152bN.dll
Resource
win10v2004-20241007-en
General
-
Target
0476a150214207c0a78a2dde516888cc96b7648fb84efe654dc0d6b49f08152bN.dll
-
Size
76KB
-
MD5
fbd99507f7dbab980ec067c880068830
-
SHA1
be353438400d8d9e08fa3f9dc964c2ac996e966a
-
SHA256
0476a150214207c0a78a2dde516888cc96b7648fb84efe654dc0d6b49f08152b
-
SHA512
45cc0b9672edae20d8709bf54150c10640e596db94644e9cde9fd05ef818c3c827f772117ee2831cbc786e8b04eb873dac40f7bc60634f9e8538a17a0205400c
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZmuTFp+Q81:c8y93KQjy7G55riF1cMo034Q81
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/784-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/784-1-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 320 784 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 784 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1924 wrote to memory of 784 1924 rundll32.exe 30 PID 1924 wrote to memory of 784 1924 rundll32.exe 30 PID 1924 wrote to memory of 784 1924 rundll32.exe 30 PID 1924 wrote to memory of 784 1924 rundll32.exe 30 PID 1924 wrote to memory of 784 1924 rundll32.exe 30 PID 1924 wrote to memory of 784 1924 rundll32.exe 30 PID 1924 wrote to memory of 784 1924 rundll32.exe 30 PID 784 wrote to memory of 320 784 rundll32.exe 31 PID 784 wrote to memory of 320 784 rundll32.exe 31 PID 784 wrote to memory of 320 784 rundll32.exe 31 PID 784 wrote to memory of 320 784 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0476a150214207c0a78a2dde516888cc96b7648fb84efe654dc0d6b49f08152bN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0476a150214207c0a78a2dde516888cc96b7648fb84efe654dc0d6b49f08152bN.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 784 -s 2323⤵
- Program crash
PID:320
-
-