Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 21:24
Behavioral task
behavioral1
Sample
81bdc28465516fae1beca30228b988c630902774fc4d6a64bd9d2e016cd94b6aN.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
81bdc28465516fae1beca30228b988c630902774fc4d6a64bd9d2e016cd94b6aN.dll
Resource
win10v2004-20241007-en
General
-
Target
81bdc28465516fae1beca30228b988c630902774fc4d6a64bd9d2e016cd94b6aN.dll
-
Size
76KB
-
MD5
4be4bffd3a690bce966888993aa4b2c0
-
SHA1
399b2ba0452f9be50a3a9e2fb71038fe86710301
-
SHA256
81bdc28465516fae1beca30228b988c630902774fc4d6a64bd9d2e016cd94b6a
-
SHA512
2c4d98ec319af8f8368183d8aabbdcdb8a2afa194652b81be268a55fab3d383f13088eee22dde4d066a31d2a49c2a24f9b4dfc3f1fd7a3eee007731fddf7e863
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7Z/BXzwerWp:c8y93KQjy7G55riF1cMo03TUBp
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
resource yara_rule behavioral2/memory/2356-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/2356-1-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4552 2356 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2356 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2356 1972 rundll32.exe 84 PID 1972 wrote to memory of 2356 1972 rundll32.exe 84 PID 1972 wrote to memory of 2356 1972 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\81bdc28465516fae1beca30228b988c630902774fc4d6a64bd9d2e016cd94b6aN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\81bdc28465516fae1beca30228b988c630902774fc4d6a64bd9d2e016cd94b6aN.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2356 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2356 -s 7003⤵
- Program crash
PID:4552
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2356 -ip 23561⤵PID:448