Analysis
-
max time kernel
93s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-12-2024 12:02
Behavioral task
behavioral1
Sample
ac0a1e31e0245e092285a37ee90c39021f14a0b2923ec6bdcc98715d78e43763N.dll
Resource
win7-20240708-en
windows7-x64
6 signatures
120 seconds
General
-
Target
ac0a1e31e0245e092285a37ee90c39021f14a0b2923ec6bdcc98715d78e43763N.dll
-
Size
76KB
-
MD5
2affa85bea193c7ee2a3b067fb2d33b0
-
SHA1
da1ad3ad01ec427d87778490de9d13a9bef23dbd
-
SHA256
ac0a1e31e0245e092285a37ee90c39021f14a0b2923ec6bdcc98715d78e43763
-
SHA512
2c55c5afeba6c91ba5111f7a32c9a893afab16a2def147816dc0312afa64d64ac7de3296adbfd9976bc9dd839dfc6b084d8750d9c13c241bbea6d41a06748bad
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7Z2cMAoSH:c8y93KQjy7G55riF1cMo03E7u
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3304-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/3304-1-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 732 3304 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3304 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4068 wrote to memory of 3304 4068 rundll32.exe 83 PID 4068 wrote to memory of 3304 4068 rundll32.exe 83 PID 4068 wrote to memory of 3304 4068 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ac0a1e31e0245e092285a37ee90c39021f14a0b2923ec6bdcc98715d78e43763N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ac0a1e31e0245e092285a37ee90c39021f14a0b2923ec6bdcc98715d78e43763N.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3304 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3304 -s 6963⤵
- Program crash
PID:732
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3304 -ip 33041⤵PID:708