Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 16:48
Static task
static1
Behavioral task
behavioral1
Sample
5df767c4ef38ccdc6af9e966a8fbece709d9dc8d723117a3366a1f474a638acbN.dll
Resource
win7-20241010-en
General
-
Target
5df767c4ef38ccdc6af9e966a8fbece709d9dc8d723117a3366a1f474a638acbN.dll
-
Size
4.7MB
-
MD5
d572497144a66fc491c301355038c940
-
SHA1
3d84b6d8c4982dc30648cd5358d55fa45b816870
-
SHA256
5df767c4ef38ccdc6af9e966a8fbece709d9dc8d723117a3366a1f474a638acb
-
SHA512
e870175a63547add563687919a036af135f3063db4a672fc67cbf92311a495d5bc13b9228c8c3b61d39f1c96c86db518037051d8a1df24215ec30c2c29310721
-
SSDEEP
98304:caTiZ7qe+aOKvp3QZ6/HbS9FugmTw3gvhiWaOuBuJ0Ato4z/uk/t:caTiZ7qfRmp3QZ6/+9Fu/v0AmWh1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2204 rundll32mgr.exe -
Loads dropped DLL 9 IoCs
pid Process 2772 rundll32.exe 2772 rundll32.exe 2836 WerFault.exe 2836 WerFault.exe 2836 WerFault.exe 2836 WerFault.exe 2836 WerFault.exe 2836 WerFault.exe 2836 WerFault.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2836 2204 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2772 2472 rundll32.exe 30 PID 2472 wrote to memory of 2772 2472 rundll32.exe 30 PID 2472 wrote to memory of 2772 2472 rundll32.exe 30 PID 2472 wrote to memory of 2772 2472 rundll32.exe 30 PID 2472 wrote to memory of 2772 2472 rundll32.exe 30 PID 2472 wrote to memory of 2772 2472 rundll32.exe 30 PID 2472 wrote to memory of 2772 2472 rundll32.exe 30 PID 2772 wrote to memory of 2204 2772 rundll32.exe 31 PID 2772 wrote to memory of 2204 2772 rundll32.exe 31 PID 2772 wrote to memory of 2204 2772 rundll32.exe 31 PID 2772 wrote to memory of 2204 2772 rundll32.exe 31 PID 2204 wrote to memory of 2836 2204 rundll32mgr.exe 32 PID 2204 wrote to memory of 2836 2204 rundll32mgr.exe 32 PID 2204 wrote to memory of 2836 2204 rundll32mgr.exe 32 PID 2204 wrote to memory of 2836 2204 rundll32mgr.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5df767c4ef38ccdc6af9e966a8fbece709d9dc8d723117a3366a1f474a638acbN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5df767c4ef38ccdc6af9e966a8fbece709d9dc8d723117a3366a1f474a638acbN.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 1004⤵
- Loads dropped DLL
- Program crash
PID:2836
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD53ac45bcb53d177c5c82da31058310e73
SHA16e8ac2a8b1f174041a8134c42ae28cd7dac2409c
SHA256ba8e0f4e6ce24f96a873b5cbcf4bdc272c26b7c024d74c0f07256e7bbba62599
SHA5128f2ec320694acdd88c09202aec938370ddc79c766ce1bf2fea12b5e8206827efca6ad9d5fb0e73de7b775f18026960182f90975763d69500ff7657befa8f8625