Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-12-2024 01:43
Behavioral task
behavioral1
Sample
b1b5f32019572e3c3088504adfe9024d56b4d92b8d671204a456203f410cb41b.dll
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
b1b5f32019572e3c3088504adfe9024d56b4d92b8d671204a456203f410cb41b.dll
-
Size
76KB
-
MD5
adada38ea275b5371b24569c4fca9e12
-
SHA1
d642da1ad89dbb11d45a2fd2d01e40638ab90a18
-
SHA256
b1b5f32019572e3c3088504adfe9024d56b4d92b8d671204a456203f410cb41b
-
SHA512
9e53f51f335b06c476c6096c6088848bdfbc4138ab6e3c1a180ffb2b441f6ab3a10dc6fed8de10bea051277feda3e645cc5322f4996dde6e5dc9c535b9dd9073
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZEEAH:c8y93KQjy7G55riF1cMo03KEe
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3920-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/3920-2-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3968 3920 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3920 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1832 wrote to memory of 3920 1832 rundll32.exe 82 PID 1832 wrote to memory of 3920 1832 rundll32.exe 82 PID 1832 wrote to memory of 3920 1832 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b1b5f32019572e3c3088504adfe9024d56b4d92b8d671204a456203f410cb41b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b1b5f32019572e3c3088504adfe9024d56b4d92b8d671204a456203f410cb41b.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3920 -s 7123⤵
- Program crash
PID:3968
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3920 -ip 39201⤵PID:3436