Analysis
-
max time kernel
16s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 04:27
Static task
static1
Behavioral task
behavioral1
Sample
1247063398e39ec53d3f4330de8f5ce4d040ed5380bc8ba7d18ae4972f766d11N.dll
Resource
win7-20240903-en
General
-
Target
1247063398e39ec53d3f4330de8f5ce4d040ed5380bc8ba7d18ae4972f766d11N.dll
-
Size
152KB
-
MD5
efc18cb8a39c8bdda2c85e8131d490c0
-
SHA1
3d86a7ff540daa5695101de92f4d3f62e46cd50c
-
SHA256
1247063398e39ec53d3f4330de8f5ce4d040ed5380bc8ba7d18ae4972f766d11
-
SHA512
ebf25c3dc222eed6d57e1e0caa46fafd2cd029f57aecf97dad74653d292cdca729e70d6b2dc63f0265633156b93634e5e5bd45a1780f7bd99c0245f0ab939b22
-
SSDEEP
3072:Cn4cV8gf2u41Z5tKlwjndw2KqUIRmuoF6A:I4y8gOl2KdEqUCmuosA
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2912 rundll32mgr.exe -
Loads dropped DLL 9 IoCs
pid Process 2848 rundll32.exe 2848 rundll32.exe 2788 WerFault.exe 2788 WerFault.exe 2788 WerFault.exe 2788 WerFault.exe 2788 WerFault.exe 2788 WerFault.exe 2788 WerFault.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2788 2912 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1872 wrote to memory of 2848 1872 rundll32.exe 28 PID 1872 wrote to memory of 2848 1872 rundll32.exe 28 PID 1872 wrote to memory of 2848 1872 rundll32.exe 28 PID 1872 wrote to memory of 2848 1872 rundll32.exe 28 PID 1872 wrote to memory of 2848 1872 rundll32.exe 28 PID 1872 wrote to memory of 2848 1872 rundll32.exe 28 PID 1872 wrote to memory of 2848 1872 rundll32.exe 28 PID 2848 wrote to memory of 2912 2848 rundll32.exe 29 PID 2848 wrote to memory of 2912 2848 rundll32.exe 29 PID 2848 wrote to memory of 2912 2848 rundll32.exe 29 PID 2848 wrote to memory of 2912 2848 rundll32.exe 29 PID 2912 wrote to memory of 2788 2912 rundll32mgr.exe 30 PID 2912 wrote to memory of 2788 2912 rundll32mgr.exe 30 PID 2912 wrote to memory of 2788 2912 rundll32mgr.exe 30 PID 2912 wrote to memory of 2788 2912 rundll32mgr.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1247063398e39ec53d3f4330de8f5ce4d040ed5380bc8ba7d18ae4972f766d11N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1247063398e39ec53d3f4330de8f5ce4d040ed5380bc8ba7d18ae4972f766d11N.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2912 -s 1004⤵
- Loads dropped DLL
- Program crash
PID:2788
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD594f2f6ffbba8e7644668b51b39983916
SHA163357bbdf90101969117983dbc0d4ed0e713c4d7
SHA256ede7603855cb37082c241c720a6650988c684eb3bcb263e5dd7b457458940fed
SHA512d04430ceac70c6fa71d07d9ee82ac2bb5e6c0641d5c9e7e5a3ed39d342e8b198f367676516a55f0653e0b88635a027b9ad220e223145b8be8df281bb6faf7156