Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 16:17
Behavioral task
behavioral1
Sample
c82dd32a4de2d442ce7ab927cbaaf47f702e168b0453996bd4d97b62a55222ebN.dll
Resource
win7-20240708-en
windows7-x64
5 signatures
120 seconds
General
-
Target
c82dd32a4de2d442ce7ab927cbaaf47f702e168b0453996bd4d97b62a55222ebN.dll
-
Size
76KB
-
MD5
2e3c5d21518bb403b1959b05a7cd7980
-
SHA1
07d87915e4a7a6411ab61323f41bc22029515191
-
SHA256
c82dd32a4de2d442ce7ab927cbaaf47f702e168b0453996bd4d97b62a55222eb
-
SHA512
519daf96f68397e2d0d396574d33470aff1fc0cf83622c85539623b1218bde035d2becaf77092c713fe6eae71498427238942469653a89558b5229008e640f97
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZrATbn:c8y93KQjy7G55riF1cMo03VATT
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1396-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/1396-1-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4088 1396 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1396 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2756 wrote to memory of 1396 2756 rundll32.exe 82 PID 2756 wrote to memory of 1396 2756 rundll32.exe 82 PID 2756 wrote to memory of 1396 2756 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c82dd32a4de2d442ce7ab927cbaaf47f702e168b0453996bd4d97b62a55222ebN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c82dd32a4de2d442ce7ab927cbaaf47f702e168b0453996bd4d97b62a55222ebN.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1396 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 7163⤵
- Program crash
PID:4088
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1396 -ip 13961⤵PID:3996