Analysis
-
max time kernel
93s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 23:43
Static task
static1
Behavioral task
behavioral1
Sample
39c29125a8c776bd6eed886f346804a23d518b77_1643743531128.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
39c29125a8c776bd6eed886f346804a23d518b77_1643743531128.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/rrkssezi.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/rrkssezi.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/rrkssezi.dll
-
Size
20KB
-
MD5
0b9de97b386a1a82cee5d3e059b7ec9b
-
SHA1
cc730fba70941afa39a9827fea215c9f099a6d01
-
SHA256
ad29dd53baa1e19fe4cacd99b9dea3b6e7fba8c6d89fe0492244de4414948e21
-
SHA512
b36cef8eb5fdf990ed79fd718a250e6f736e585516b4cfc97b7a0aba6f254e8997d8cf0262b0f4a894dc91e13c2b22aaa1eac554c2e23c42e50e8bc2fae3ad3d
-
SSDEEP
384:cYwn4GqWlh1i9E8LB2T35YjzYDYp0fRBtsoudoq0HNyp:7wnskhU6tTuYkpoudohy
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1360 2244 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4336 wrote to memory of 2244 4336 rundll32.exe 83 PID 4336 wrote to memory of 2244 4336 rundll32.exe 83 PID 4336 wrote to memory of 2244 4336 rundll32.exe 83 PID 2244 wrote to memory of 2212 2244 rundll32.exe 84 PID 2244 wrote to memory of 2212 2244 rundll32.exe 84 PID 2244 wrote to memory of 2212 2244 rundll32.exe 84 PID 2244 wrote to memory of 2212 2244 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\rrkssezi.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\rrkssezi.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\rrkssezi.dll,#13⤵PID:2212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2244 -s 7283⤵
- Program crash
PID:1360
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2244 -ip 22441⤵PID:2524