Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 23:05
Static task
static1
Behavioral task
behavioral1
Sample
PROFORMA INVOICE.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PROFORMA INVOICE.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/dvxpshe.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/dvxpshe.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/dvxpshe.dll
-
Size
66KB
-
MD5
45f315f24046abc7cbe07a0f08a500b4
-
SHA1
5fcbdb3743ac2497181bd800622b98033e0232bd
-
SHA256
231d2605fc4ba8b8abed10831692542931ad6e7f647225376723cf385695f1bf
-
SHA512
a2df0a846c508318eb0eee02921c7f345aaaed5fcc25bee179eb092586c145b8348fb232a22a349fe2bcfa9166778c5812062ce89782d7f8fb2de56497f10a31
-
SSDEEP
768:6PTL7gePJuhk15raztjcwg0Jm8jYMLZdSDoeA/BUi0O281TbUfszDD3VlcwLVj:6bL7geRubzt/gyj1LZqOvRbUfsbrTR
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3956 3224 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4740 wrote to memory of 3224 4740 rundll32.exe 82 PID 4740 wrote to memory of 3224 4740 rundll32.exe 82 PID 4740 wrote to memory of 3224 4740 rundll32.exe 82 PID 3224 wrote to memory of 2084 3224 rundll32.exe 83 PID 3224 wrote to memory of 2084 3224 rundll32.exe 83 PID 3224 wrote to memory of 2084 3224 rundll32.exe 83 PID 3224 wrote to memory of 2084 3224 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\dvxpshe.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\dvxpshe.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\dvxpshe.dll,#13⤵PID:2084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3224 -s 7163⤵
- Program crash
PID:3956
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3224 -ip 32241⤵PID:2260