Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 18:20
Static task
static1
Behavioral task
behavioral1
Sample
e5d36cbb52be6f974b08fc9c0f4680fa69413697ae7f7c450ef73d707377f898N.dll
Resource
win7-20240903-en
General
-
Target
e5d36cbb52be6f974b08fc9c0f4680fa69413697ae7f7c450ef73d707377f898N.dll
-
Size
288KB
-
MD5
a764c596c8234a4b7541328cfcf85340
-
SHA1
3bf749c49f4c0fe513cf5e7ef2bf9ce5e638e0c1
-
SHA256
e5d36cbb52be6f974b08fc9c0f4680fa69413697ae7f7c450ef73d707377f898
-
SHA512
c3ee0604ff8501eb5ba7ffe5223a78dde89639210d0c80d486384ed327d638268d3fecd5632ca7d4764eea71832e2263a688966ef921b705d42529565c51d30f
-
SSDEEP
6144:5CIGPj038tAgFMldWNX+fNErZiYqVHS9fE5M7i4y3l:yj038t/FMldW4fAZiYqVHY80w3l
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2020 rundll32mgr.exe -
Loads dropped DLL 9 IoCs
pid Process 1924 rundll32.exe 1924 rundll32.exe 756 WerFault.exe 756 WerFault.exe 756 WerFault.exe 756 WerFault.exe 756 WerFault.exe 756 WerFault.exe 756 WerFault.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1980 1924 WerFault.exe 30 756 2020 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2540 wrote to memory of 1924 2540 rundll32.exe 30 PID 2540 wrote to memory of 1924 2540 rundll32.exe 30 PID 2540 wrote to memory of 1924 2540 rundll32.exe 30 PID 2540 wrote to memory of 1924 2540 rundll32.exe 30 PID 2540 wrote to memory of 1924 2540 rundll32.exe 30 PID 2540 wrote to memory of 1924 2540 rundll32.exe 30 PID 2540 wrote to memory of 1924 2540 rundll32.exe 30 PID 1924 wrote to memory of 2020 1924 rundll32.exe 31 PID 1924 wrote to memory of 2020 1924 rundll32.exe 31 PID 1924 wrote to memory of 2020 1924 rundll32.exe 31 PID 1924 wrote to memory of 2020 1924 rundll32.exe 31 PID 1924 wrote to memory of 1980 1924 rundll32.exe 32 PID 1924 wrote to memory of 1980 1924 rundll32.exe 32 PID 1924 wrote to memory of 1980 1924 rundll32.exe 32 PID 1924 wrote to memory of 1980 1924 rundll32.exe 32 PID 2020 wrote to memory of 756 2020 rundll32mgr.exe 33 PID 2020 wrote to memory of 756 2020 rundll32mgr.exe 33 PID 2020 wrote to memory of 756 2020 rundll32mgr.exe 33 PID 2020 wrote to memory of 756 2020 rundll32mgr.exe 33
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e5d36cbb52be6f974b08fc9c0f4680fa69413697ae7f7c450ef73d707377f898N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e5d36cbb52be6f974b08fc9c0f4680fa69413697ae7f7c450ef73d707377f898N.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 924⤵
- Loads dropped DLL
- Program crash
PID:756
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 2243⤵
- Program crash
PID:1980
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
121KB
MD5623d4fbb23eede885545651c25bc9b28
SHA1290d67841d6bd8ce68ae88d8f4a3e3bdca072143
SHA2561546eae84af97be2cfd8127c75f79b03bd18cc9f44630d3e4e87a5074c644050
SHA512e489e9316626a645581fb5f0db8458df951643ebdb5a9e9224b3a3f4d9808efbda3a1ad260d865bd49ee385ddf46188072700e0536d3a335cacbaba998ea2f2a