Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 09:11
Behavioral task
behavioral1
Sample
660432da32de47bade8f30beaf5946d1c9d08910982581a31223940ea4e5b4b7.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
660432da32de47bade8f30beaf5946d1c9d08910982581a31223940ea4e5b4b7.dll
Resource
win10v2004-20241007-en
General
-
Target
660432da32de47bade8f30beaf5946d1c9d08910982581a31223940ea4e5b4b7.dll
-
Size
300KB
-
MD5
73d29bae0d673d0c65264a49771a8ee3
-
SHA1
c3e48057541d4fe9d981e5adb53bd9cd508659ae
-
SHA256
660432da32de47bade8f30beaf5946d1c9d08910982581a31223940ea4e5b4b7
-
SHA512
ff3a7530889d34d349d9fd781dc9279725cddb300d13508f2e5a1c831a9048cabe1ac7d87ec92164b22f91d29eeabbe36bcc46f0c2fe713d7554faf393d3fea4
-
SSDEEP
6144:PjdFKdoSxvixTxUAHh/w2GWziZms1f4wYd2wL:jhGvixUAOv113YdHL
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1740 1632 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1620 wrote to memory of 1632 1620 rundll32.exe 30 PID 1620 wrote to memory of 1632 1620 rundll32.exe 30 PID 1620 wrote to memory of 1632 1620 rundll32.exe 30 PID 1620 wrote to memory of 1632 1620 rundll32.exe 30 PID 1620 wrote to memory of 1632 1620 rundll32.exe 30 PID 1620 wrote to memory of 1632 1620 rundll32.exe 30 PID 1620 wrote to memory of 1632 1620 rundll32.exe 30 PID 1632 wrote to memory of 1740 1632 rundll32.exe 31 PID 1632 wrote to memory of 1740 1632 rundll32.exe 31 PID 1632 wrote to memory of 1740 1632 rundll32.exe 31 PID 1632 wrote to memory of 1740 1632 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\660432da32de47bade8f30beaf5946d1c9d08910982581a31223940ea4e5b4b7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\660432da32de47bade8f30beaf5946d1c9d08910982581a31223940ea4e5b4b7.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1632 -s 2403⤵
- Program crash
PID:1740
-
-