Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 09:51
Behavioral task
behavioral1
Sample
c8a53033b97ff0ba41fc52c44018e9df273fe900a10bdca857d00f698b91626dN.dll
Resource
win7-20241023-en
windows7-x64
5 signatures
120 seconds
General
-
Target
c8a53033b97ff0ba41fc52c44018e9df273fe900a10bdca857d00f698b91626dN.dll
-
Size
76KB
-
MD5
1569ab93946715c615f72ddf4e827490
-
SHA1
7ab7c0f42ae2daeecbe1198ded5b80adc350c681
-
SHA256
c8a53033b97ff0ba41fc52c44018e9df273fe900a10bdca857d00f698b91626d
-
SHA512
fba24bef949382c32cb1e82e1f08a405506100e2a76f0fe5e90f7b269c5f4cc8cf96fdecbbd7ed6dcd2aefb2671235a540742693f021e17776edf133a94cc16e
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7Z6ZuNz3E:c8y93KQjy7G55riF1cMo035x0
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/588-2-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/588-3-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/588-1-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/588-4-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 400 588 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 588 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1268 wrote to memory of 588 1268 rundll32.exe 31 PID 1268 wrote to memory of 588 1268 rundll32.exe 31 PID 1268 wrote to memory of 588 1268 rundll32.exe 31 PID 1268 wrote to memory of 588 1268 rundll32.exe 31 PID 1268 wrote to memory of 588 1268 rundll32.exe 31 PID 1268 wrote to memory of 588 1268 rundll32.exe 31 PID 1268 wrote to memory of 588 1268 rundll32.exe 31 PID 588 wrote to memory of 400 588 rundll32.exe 32 PID 588 wrote to memory of 400 588 rundll32.exe 32 PID 588 wrote to memory of 400 588 rundll32.exe 32 PID 588 wrote to memory of 400 588 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c8a53033b97ff0ba41fc52c44018e9df273fe900a10bdca857d00f698b91626dN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c8a53033b97ff0ba41fc52c44018e9df273fe900a10bdca857d00f698b91626dN.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 588 -s 3283⤵
- Program crash
PID:400
-
-