Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-12-2024 19:28
Behavioral task
behavioral1
Sample
084d310f6836c386c6c3f3eb879848c09a0454d9e5fee9c01bc67a4a27b1f82eN.dll
Resource
win7-20240729-en
windows7-x64
5 signatures
120 seconds
General
-
Target
084d310f6836c386c6c3f3eb879848c09a0454d9e5fee9c01bc67a4a27b1f82eN.dll
-
Size
76KB
-
MD5
75b15c53ab2a3e503cb3314718a5de50
-
SHA1
c4102247e906b2cdc9cc1519bcd147cc590c3840
-
SHA256
084d310f6836c386c6c3f3eb879848c09a0454d9e5fee9c01bc67a4a27b1f82e
-
SHA512
72bd361d40d763ff752657da25b47089ab34067f2eaa5a08b55f8c4a7e8dc350f64fb81c14cdebe77703b2c05e61438131a85eff473a7249748daed95e044639
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7Z4XPt0pK:c8y93KQjy7G55riF1cMo03qXOpK
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3916-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/3916-1-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4964 3916 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3916 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3264 wrote to memory of 3916 3264 rundll32.exe 82 PID 3264 wrote to memory of 3916 3264 rundll32.exe 82 PID 3264 wrote to memory of 3916 3264 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\084d310f6836c386c6c3f3eb879848c09a0454d9e5fee9c01bc67a4a27b1f82eN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\084d310f6836c386c6c3f3eb879848c09a0454d9e5fee9c01bc67a4a27b1f82eN.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3916 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 7043⤵
- Program crash
PID:4964
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3916 -ip 39161⤵PID:748