Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 05:18
Static task
static1
Behavioral task
behavioral1
Sample
5ebe6ba38668bf9ea005de9cd192b5e6fb0c35021c525a53a0a9bf016fcb010eN.dll
Resource
win7-20240903-en
General
-
Target
5ebe6ba38668bf9ea005de9cd192b5e6fb0c35021c525a53a0a9bf016fcb010eN.dll
-
Size
2.0MB
-
MD5
a87f0d53886f70aa71ad233d561e0200
-
SHA1
3d87d32cc8e1245be6a6ed80aa753ef115ecb2f4
-
SHA256
5ebe6ba38668bf9ea005de9cd192b5e6fb0c35021c525a53a0a9bf016fcb010e
-
SHA512
176a2e81440ce5cfac83ec6e40b24144b62e2f481e97937e8d275090bf2b246a4810fb29e3add0d45698d7854958153af69d060cb9908c686a3e6861001b0d5c
-
SSDEEP
24576:L7IY7a9IRCRqRPkHQo411810cNScGKJydXTZDwmzRMo3DP7x5nbiQj2k70gBZzos:/IY5RMHMf810Knor5zqo3zNJuQj7jMs
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1784 rundll32mgr.exe 2300 rundll32mgrmgr.exe -
Loads dropped DLL 18 IoCs
pid Process 2196 rundll32.exe 2196 rundll32.exe 1784 rundll32mgr.exe 1784 rundll32mgr.exe 2348 WerFault.exe 2348 WerFault.exe 2348 WerFault.exe 2348 WerFault.exe 2348 WerFault.exe 2348 WerFault.exe 2352 WerFault.exe 2352 WerFault.exe 2352 WerFault.exe 2352 WerFault.exe 2352 WerFault.exe 2352 WerFault.exe 2352 WerFault.exe 2348 WerFault.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe File created C:\Windows\SysWOW64\rundll32mgrmgr.exe rundll32mgr.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 1252 2196 WerFault.exe 30 2352 2300 WerFault.exe 2348 1784 WerFault.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgrmgr.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2196 1972 rundll32.exe 30 PID 1972 wrote to memory of 2196 1972 rundll32.exe 30 PID 1972 wrote to memory of 2196 1972 rundll32.exe 30 PID 1972 wrote to memory of 2196 1972 rundll32.exe 30 PID 1972 wrote to memory of 2196 1972 rundll32.exe 30 PID 1972 wrote to memory of 2196 1972 rundll32.exe 30 PID 1972 wrote to memory of 2196 1972 rundll32.exe 30 PID 2196 wrote to memory of 1784 2196 rundll32.exe 31 PID 2196 wrote to memory of 1784 2196 rundll32.exe 31 PID 2196 wrote to memory of 1784 2196 rundll32.exe 31 PID 2196 wrote to memory of 1784 2196 rundll32.exe 31 PID 1784 wrote to memory of 2300 1784 rundll32mgr.exe 32 PID 1784 wrote to memory of 2300 1784 rundll32mgr.exe 32 PID 1784 wrote to memory of 2300 1784 rundll32mgr.exe 32 PID 1784 wrote to memory of 2300 1784 rundll32mgr.exe 32 PID 1784 wrote to memory of 2348 1784 rundll32mgr.exe 33 PID 1784 wrote to memory of 2348 1784 rundll32mgr.exe 33 PID 1784 wrote to memory of 2348 1784 rundll32mgr.exe 33 PID 1784 wrote to memory of 2348 1784 rundll32mgr.exe 33 PID 2300 wrote to memory of 2352 2300 rundll32mgrmgr.exe 34 PID 2300 wrote to memory of 2352 2300 rundll32mgrmgr.exe 34 PID 2300 wrote to memory of 2352 2300 rundll32mgrmgr.exe 34 PID 2300 wrote to memory of 2352 2300 rundll32mgrmgr.exe 34 PID 2196 wrote to memory of 1252 2196 rundll32.exe 35 PID 2196 wrote to memory of 1252 2196 rundll32.exe 35 PID 2196 wrote to memory of 1252 2196 rundll32.exe 35 PID 2196 wrote to memory of 1252 2196 rundll32.exe 35
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5ebe6ba38668bf9ea005de9cd192b5e6fb0c35021c525a53a0a9bf016fcb010eN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5ebe6ba38668bf9ea005de9cd192b5e6fb0c35021c525a53a0a9bf016fcb010eN.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\rundll32mgrmgr.exeC:\Windows\SysWOW64\rundll32mgrmgr.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2300 -s 1565⤵
- Loads dropped DLL
- Program crash
PID:2352
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1784 -s 1524⤵
- Loads dropped DLL
- Program crash
PID:2348
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2196 -s 2283⤵
- Program crash
PID:1252
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
123KB
MD59f2ac7383413965045aa13a4705a8d99
SHA17add11d19bea49fcbb6cdf315d71477a11998e8d
SHA2560cf6926cc791b40eede351eef639396100282ea612fcb42bda9c8096e069908b
SHA512e90cc32e2bda5446000ddd816ef47f683804a4042fce1ce5bb5e58c37ece4498736eda9126f4c992dd6c6eba3936e392d1250c1c5dcd6cafa80eb9ee5ad0d377
-
Filesize
249KB
MD5137e9937fd71061c0e4a06812b009177
SHA173770a377c2f24584c9fe9084a5c4364a54ddbf8
SHA256b6301b1793aca7b2fa9a589880f4e9454647d9d16b8edcac39b319349ae87d86
SHA51213b1fcd197b9147ab7385f29eca585a50a4da12152ad89129712a653336eeb133c3ddb9e0db6cb233e45d96bcfea5ed65b1193114746acc2d92820e682df414c