Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 16:08
Static task
static1
Behavioral task
behavioral1
Sample
7b97b9673170dce184556a790a8bf4d0ae847fa757f3564edd0540a187c31621.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7b97b9673170dce184556a790a8bf4d0ae847fa757f3564edd0540a187c31621.dll
Resource
win10v2004-20241007-en
General
-
Target
7b97b9673170dce184556a790a8bf4d0ae847fa757f3564edd0540a187c31621.dll
-
Size
380KB
-
MD5
2e105a3d4ac1f34442ac38c4aed63aa5
-
SHA1
5b6d9102642d2971e74850c79f1aece482d112e0
-
SHA256
7b97b9673170dce184556a790a8bf4d0ae847fa757f3564edd0540a187c31621
-
SHA512
966af334e95e70e610ffca72d4b651fc2da78716aa502f793482b3ab75fd47a37918fdfd1ef64b73213fae00daf1112f96e4ec8e74a1e87ad812b8a443816685
-
SSDEEP
6144:/4y8gOl2lWXFYTVNtfU3bnKWWJZfEJ8xln5+H:gy8gyQNe2J6Js58
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1648 rundll32mgr.exe 2368 rundll32mgrmgr.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgrmgr.exe rundll32mgr.exe File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2864 1648 WerFault.exe 84 4636 2368 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgrmgr.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3764 wrote to memory of 4156 3764 rundll32.exe 83 PID 3764 wrote to memory of 4156 3764 rundll32.exe 83 PID 3764 wrote to memory of 4156 3764 rundll32.exe 83 PID 4156 wrote to memory of 1648 4156 rundll32.exe 84 PID 4156 wrote to memory of 1648 4156 rundll32.exe 84 PID 4156 wrote to memory of 1648 4156 rundll32.exe 84 PID 1648 wrote to memory of 2368 1648 rundll32mgr.exe 85 PID 1648 wrote to memory of 2368 1648 rundll32mgr.exe 85 PID 1648 wrote to memory of 2368 1648 rundll32mgr.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7b97b9673170dce184556a790a8bf4d0ae847fa757f3564edd0540a187c31621.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7b97b9673170dce184556a790a8bf4d0ae847fa757f3564edd0540a187c31621.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\rundll32mgrmgr.exeC:\Windows\SysWOW64\rundll32mgrmgr.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2368 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2368 -s 3165⤵
- Program crash
PID:4636
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1648 -s 3124⤵
- Program crash
PID:2864
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1648 -ip 16481⤵PID:1668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2368 -ip 23681⤵PID:1008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288KB
MD5cfe059b10b1bc8f06bb9c6138d483841
SHA1249c77b3fd7e8ccf8e28265d26b398afa2c35da8
SHA2568b8112544efbab0d457590a04fe11069073d29f7b912e7c163cb7ab4c215570f
SHA512f7fc030eb5650cee2ecdd23e4874b51ce76aebda0d639f7ac7d0c4554f51c81998b935b68a57802c154b6a7d76966ec0c6b59e40654e4ac237f7dc6da88d1d46
-
Filesize
143KB
MD5963056968f712dce49fed780756eafa3
SHA11f833526e877d34bda4b7aad52be1b52f25c9bf2
SHA256be71c16ee9e9ea295cf6f266ddf343c4589843e4288a09f60f9e15923d8f8313
SHA5128ff2bd3c17e6a8730940dcc45faa600c5429a1e5e812821350d8c6448ddcc1526f5246608b5a56592276b15a821a78440adf05652c7dfb2b0016707dce9c958e