Analysis
-
max time kernel
114s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 00:02
Static task
static1
Behavioral task
behavioral1
Sample
325d5916ac8acdac5be76a2e536a4f8a668f0e751bf077ccb1b19d05914cdb37.dll
Resource
win7-20241010-en
General
-
Target
325d5916ac8acdac5be76a2e536a4f8a668f0e751bf077ccb1b19d05914cdb37.dll
-
Size
2.0MB
-
MD5
35db4ac4dcd4ffeb07d06c740d086511
-
SHA1
70f57f77d181df85f0f801a643e7ac75c73d0b95
-
SHA256
325d5916ac8acdac5be76a2e536a4f8a668f0e751bf077ccb1b19d05914cdb37
-
SHA512
fb7b9aa116221b67db4f99459153e1c4d3df7ddf29756291e890da2db9cdda2942d8965fda50bb1cf86526ab73a00f6996ce356b0a0e16f7f192a8fdc3ecc73b
-
SSDEEP
24576:L7IY7a9IRCRqRPkHQo411810cNScGKJydXTZDwmzRMo3DP7x5nbiQj2k70gBZzoU:/IY5RMHMf810Knor5zqo3zNJuQj7jMU
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1560 rundll32mgr.exe 2780 rundll32mgrmgr.exe -
Loads dropped DLL 18 IoCs
pid Process 2536 rundll32.exe 2536 rundll32.exe 1560 rundll32mgr.exe 1560 rundll32mgr.exe 2488 WerFault.exe 2488 WerFault.exe 2488 WerFault.exe 2488 WerFault.exe 2488 WerFault.exe 2488 WerFault.exe 2744 WerFault.exe 2744 WerFault.exe 2744 WerFault.exe 2744 WerFault.exe 2744 WerFault.exe 2744 WerFault.exe 2744 WerFault.exe 2488 WerFault.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe File created C:\Windows\SysWOW64\rundll32mgrmgr.exe rundll32mgr.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 2488 1560 WerFault.exe 32 2804 2536 WerFault.exe 31 2744 2780 WerFault.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgrmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1764 wrote to memory of 2536 1764 rundll32.exe 31 PID 1764 wrote to memory of 2536 1764 rundll32.exe 31 PID 1764 wrote to memory of 2536 1764 rundll32.exe 31 PID 1764 wrote to memory of 2536 1764 rundll32.exe 31 PID 1764 wrote to memory of 2536 1764 rundll32.exe 31 PID 1764 wrote to memory of 2536 1764 rundll32.exe 31 PID 1764 wrote to memory of 2536 1764 rundll32.exe 31 PID 2536 wrote to memory of 1560 2536 rundll32.exe 32 PID 2536 wrote to memory of 1560 2536 rundll32.exe 32 PID 2536 wrote to memory of 1560 2536 rundll32.exe 32 PID 2536 wrote to memory of 1560 2536 rundll32.exe 32 PID 1560 wrote to memory of 2780 1560 rundll32mgr.exe 33 PID 1560 wrote to memory of 2780 1560 rundll32mgr.exe 33 PID 1560 wrote to memory of 2780 1560 rundll32mgr.exe 33 PID 1560 wrote to memory of 2780 1560 rundll32mgr.exe 33 PID 1560 wrote to memory of 2488 1560 rundll32mgr.exe 34 PID 1560 wrote to memory of 2488 1560 rundll32mgr.exe 34 PID 1560 wrote to memory of 2488 1560 rundll32mgr.exe 34 PID 1560 wrote to memory of 2488 1560 rundll32mgr.exe 34 PID 2780 wrote to memory of 2744 2780 rundll32mgrmgr.exe 35 PID 2780 wrote to memory of 2744 2780 rundll32mgrmgr.exe 35 PID 2780 wrote to memory of 2744 2780 rundll32mgrmgr.exe 35 PID 2780 wrote to memory of 2744 2780 rundll32mgrmgr.exe 35 PID 2536 wrote to memory of 2804 2536 rundll32.exe 36 PID 2536 wrote to memory of 2804 2536 rundll32.exe 36 PID 2536 wrote to memory of 2804 2536 rundll32.exe 36 PID 2536 wrote to memory of 2804 2536 rundll32.exe 36
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\325d5916ac8acdac5be76a2e536a4f8a668f0e751bf077ccb1b19d05914cdb37.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\325d5916ac8acdac5be76a2e536a4f8a668f0e751bf077ccb1b19d05914cdb37.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\rundll32mgrmgr.exeC:\Windows\SysWOW64\rundll32mgrmgr.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2780 -s 1565⤵
- Loads dropped DLL
- Program crash
PID:2744
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 1524⤵
- Loads dropped DLL
- Program crash
PID:2488
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2536 -s 2323⤵
- Program crash
PID:2804
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
249KB
MD5137e9937fd71061c0e4a06812b009177
SHA173770a377c2f24584c9fe9084a5c4364a54ddbf8
SHA256b6301b1793aca7b2fa9a589880f4e9454647d9d16b8edcac39b319349ae87d86
SHA51213b1fcd197b9147ab7385f29eca585a50a4da12152ad89129712a653336eeb133c3ddb9e0db6cb233e45d96bcfea5ed65b1193114746acc2d92820e682df414c
-
Filesize
123KB
MD59f2ac7383413965045aa13a4705a8d99
SHA17add11d19bea49fcbb6cdf315d71477a11998e8d
SHA2560cf6926cc791b40eede351eef639396100282ea612fcb42bda9c8096e069908b
SHA512e90cc32e2bda5446000ddd816ef47f683804a4042fce1ce5bb5e58c37ece4498736eda9126f4c992dd6c6eba3936e392d1250c1c5dcd6cafa80eb9ee5ad0d377