Overview
overview
3Static
static
3PayPal SoftWare.exe
windows7-x64
3PayPal SoftWare.exe
windows10-2004-x64
3libeay32.dll
windows7-x64
3libeay32.dll
windows10-2004-x64
3msvcr71.dll
windows7-x64
3msvcr71.dll
windows10-2004-x64
3ssleay32.dll
windows7-x64
3ssleay32.dll
windows10-2004-x64
3user34.dll
windows7-x64
3user34.dll
windows10-2004-x64
3Analysis
-
max time kernel
95s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 15:14
Static task
static1
Behavioral task
behavioral1
Sample
PayPal SoftWare.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
PayPal SoftWare.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
libeay32.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
libeay32.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
msvcr71.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
msvcr71.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
ssleay32.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
ssleay32.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
user34.dll
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
user34.dll
Resource
win10v2004-20241007-en
General
-
Target
user34.dll
-
Size
670KB
-
MD5
67a6d22826f701e63002785b1f9f41ed
-
SHA1
bfdc1c737a32c5480cb8482ec8d7d16d650ccf0c
-
SHA256
33ba38ba85e9fc4ee16280287a0ed7ea9d3424694ff1adf7cb7758ee8d217ee8
-
SHA512
a042f00ae221dec16bd360a408af2aedc801f4fba8102139198c3a2169c50e7ec5839ddef21cc5aa0f9d34558dcf929ca11aa3b40d3f32d4927c3a136a115a30
-
SSDEEP
12288:DWCc7IEeHBiDIT8kPzWoSyFlbHupIMNjdG3Zsmiz:qCshaB3TC6dHT0jdUsmi
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2896 1292 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5064 wrote to memory of 1292 5064 rundll32.exe 84 PID 5064 wrote to memory of 1292 5064 rundll32.exe 84 PID 5064 wrote to memory of 1292 5064 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\user34.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\user34.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1292 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1292 -s 5443⤵
- Program crash
PID:2896
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 1292 -ip 12921⤵PID:3684