Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 04:47
Behavioral task
behavioral1
Sample
296bbad1ca6a4188188ccbdb339812a1d19c15747698435ede1a3a629a51d8baN.dll
Resource
win7-20240729-en
windows7-x64
5 signatures
120 seconds
General
-
Target
296bbad1ca6a4188188ccbdb339812a1d19c15747698435ede1a3a629a51d8baN.dll
-
Size
76KB
-
MD5
e133005e8eed8680708cc4e6cdbb5210
-
SHA1
6eb677097179fc8c726aae79912a85e2a6ec43a3
-
SHA256
296bbad1ca6a4188188ccbdb339812a1d19c15747698435ede1a3a629a51d8ba
-
SHA512
358fd89957a39182499cfaeee87ba4faf3e1cf208fc7522ab21cd790baeb02b277b0a3a56e55e2e06385b227ee974c2ec5efff50f3dd25c463b0e48d566eb50b
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZM4:c8y93KQjy7G55riF1cMo03L
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2548-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/2548-1-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1628 2548 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2548 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1176 wrote to memory of 2548 1176 rundll32.exe 82 PID 1176 wrote to memory of 2548 1176 rundll32.exe 82 PID 1176 wrote to memory of 2548 1176 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\296bbad1ca6a4188188ccbdb339812a1d19c15747698435ede1a3a629a51d8baN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\296bbad1ca6a4188188ccbdb339812a1d19c15747698435ede1a3a629a51d8baN.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 7043⤵
- Program crash
PID:1628
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2548 -ip 25481⤵PID:3976