Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 05:12
Behavioral task
behavioral1
Sample
33a80aa407615a5af203d31e1f1ee91df044220933e67d68be910bcb7ce9bb72N.dll
Resource
win7-20240903-en
windows7-x64
6 signatures
120 seconds
General
-
Target
33a80aa407615a5af203d31e1f1ee91df044220933e67d68be910bcb7ce9bb72N.dll
-
Size
76KB
-
MD5
692c8a067d06b2d1feaac7c996d45480
-
SHA1
12fc318d9ac7238885c335a6c1ea48076a1a6ae6
-
SHA256
33a80aa407615a5af203d31e1f1ee91df044220933e67d68be910bcb7ce9bb72
-
SHA512
a76ceadea278583a24f4c067040dd9fe7b74195428290b07c8891c780ee3e22ea1789ac8f61bdec15c78097aa9666d8a3e59f5bda77f872a8c4e2f9e9849858f
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZZHfj:c8y93KQjy7G55riF1cMo03n/j
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4568-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/4568-2-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4476 4568 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4568 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3380 wrote to memory of 4568 3380 rundll32.exe 82 PID 3380 wrote to memory of 4568 3380 rundll32.exe 82 PID 3380 wrote to memory of 4568 3380 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\33a80aa407615a5af203d31e1f1ee91df044220933e67d68be910bcb7ce9bb72N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\33a80aa407615a5af203d31e1f1ee91df044220933e67d68be910bcb7ce9bb72N.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4568 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 7043⤵
- Program crash
PID:4476
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4568 -ip 45681⤵PID:2312