Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 03:25
Static task
static1
Behavioral task
behavioral1
Sample
dbc7b25437000025f0e11db80b40fc1a616d70b22081fbab175a6e3131b33869N.dll
Resource
win7-20240903-en
General
-
Target
dbc7b25437000025f0e11db80b40fc1a616d70b22081fbab175a6e3131b33869N.dll
-
Size
124KB
-
MD5
be69266a274aabd650738259d64992b0
-
SHA1
677c057e18eb7b316af2725fd470532adf9359ce
-
SHA256
dbc7b25437000025f0e11db80b40fc1a616d70b22081fbab175a6e3131b33869
-
SHA512
53c8c7b3ef260208d5fa6473fe69cd277135ae105f1987095981036928781060dda376b1861e6506f7b6f98175f1a53ea80561b7366ea03c4d8e98bd41322b29
-
SSDEEP
3072:8j6tdCcM7VmKeZ88Dkj7oR2SqwKJXtf5DGyVBQwIY6X4O:8HcvZNDkYR2SqwK/AyVBQ9RIO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2152 rundll32mgr.exe -
Loads dropped DLL 9 IoCs
pid Process 2908 rundll32.exe 2908 rundll32.exe 1752 WerFault.exe 1752 WerFault.exe 1752 WerFault.exe 1752 WerFault.exe 1752 WerFault.exe 1752 WerFault.exe 1752 WerFault.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1752 2152 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2428 wrote to memory of 2908 2428 rundll32.exe 30 PID 2428 wrote to memory of 2908 2428 rundll32.exe 30 PID 2428 wrote to memory of 2908 2428 rundll32.exe 30 PID 2428 wrote to memory of 2908 2428 rundll32.exe 30 PID 2428 wrote to memory of 2908 2428 rundll32.exe 30 PID 2428 wrote to memory of 2908 2428 rundll32.exe 30 PID 2428 wrote to memory of 2908 2428 rundll32.exe 30 PID 2908 wrote to memory of 2152 2908 rundll32.exe 31 PID 2908 wrote to memory of 2152 2908 rundll32.exe 31 PID 2908 wrote to memory of 2152 2908 rundll32.exe 31 PID 2908 wrote to memory of 2152 2908 rundll32.exe 31 PID 2152 wrote to memory of 1752 2152 rundll32mgr.exe 32 PID 2152 wrote to memory of 1752 2152 rundll32mgr.exe 32 PID 2152 wrote to memory of 1752 2152 rundll32mgr.exe 32 PID 2152 wrote to memory of 1752 2152 rundll32mgr.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dbc7b25437000025f0e11db80b40fc1a616d70b22081fbab175a6e3131b33869N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dbc7b25437000025f0e11db80b40fc1a616d70b22081fbab175a6e3131b33869N.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2152 -s 924⤵
- Loads dropped DLL
- Program crash
PID:1752
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD5fe76e62c9c90a4bea8f2c464dc867719
SHA1f0935e8b6c22dea5c6e9d4127f5c10363deba541
SHA2565705c47b229c893f67741480ed5e3bce60597b2bb0dd755fb1f499a23888d7d6
SHA5127d6d5bfb10df493ffea7132807be417b5a283d34a1cd49042390b2b927691fd53ecf8eee459c727844395f34e4230b2cd85b38b7fb7df0a3638b244d0c3f6394