Analysis
-
max time kernel
80s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 17:29
Static task
static1
Behavioral task
behavioral1
Sample
9f346e84baa5b20e4b3807c9ac04f75704db01abea2e47b2f9ed38dddb567402N.dll
Resource
win7-20240903-en
General
-
Target
9f346e84baa5b20e4b3807c9ac04f75704db01abea2e47b2f9ed38dddb567402N.dll
-
Size
1.2MB
-
MD5
a5cab5f8f7b67680de7ec676189f5560
-
SHA1
3bb5d93e0ecf4386f11bf40e69b20bd1f5f07cc3
-
SHA256
9f346e84baa5b20e4b3807c9ac04f75704db01abea2e47b2f9ed38dddb567402
-
SHA512
177c0d50b2096100e8a5d998b0f99966423649b44142c8660dfd311693250afbf9ee99bec4a845b9d511d9202298bcaa2f7e6d92d8f5483f338df60bce4e038e
-
SSDEEP
24576:U8F+Pzr/Hfp4MIYwZckMQmeVgheBvriXR/:U88zrp4MwL7vi
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2840 rundll32mgr.exe 2696 rundll32mgrmgr.exe -
Loads dropped DLL 22 IoCs
pid Process 2824 rundll32.exe 2824 rundll32.exe 2840 rundll32mgr.exe 2840 rundll32mgr.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 2852 WerFault.exe 2852 WerFault.exe 2852 WerFault.exe 2852 WerFault.exe 2852 WerFault.exe 2852 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 2852 WerFault.exe 2852 WerFault.exe 2852 WerFault.exe 2724 WerFault.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgrmgr.exe rundll32mgr.exe File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2852 2696 WerFault.exe 32 2724 2840 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgrmgr.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2824 2720 rundll32.exe 30 PID 2720 wrote to memory of 2824 2720 rundll32.exe 30 PID 2720 wrote to memory of 2824 2720 rundll32.exe 30 PID 2720 wrote to memory of 2824 2720 rundll32.exe 30 PID 2720 wrote to memory of 2824 2720 rundll32.exe 30 PID 2720 wrote to memory of 2824 2720 rundll32.exe 30 PID 2720 wrote to memory of 2824 2720 rundll32.exe 30 PID 2824 wrote to memory of 2840 2824 rundll32.exe 31 PID 2824 wrote to memory of 2840 2824 rundll32.exe 31 PID 2824 wrote to memory of 2840 2824 rundll32.exe 31 PID 2824 wrote to memory of 2840 2824 rundll32.exe 31 PID 2840 wrote to memory of 2696 2840 rundll32mgr.exe 32 PID 2840 wrote to memory of 2696 2840 rundll32mgr.exe 32 PID 2840 wrote to memory of 2696 2840 rundll32mgr.exe 32 PID 2840 wrote to memory of 2696 2840 rundll32mgr.exe 32 PID 2840 wrote to memory of 2724 2840 rundll32mgr.exe 33 PID 2840 wrote to memory of 2724 2840 rundll32mgr.exe 33 PID 2840 wrote to memory of 2724 2840 rundll32mgr.exe 33 PID 2840 wrote to memory of 2724 2840 rundll32mgr.exe 33 PID 2696 wrote to memory of 2852 2696 rundll32mgrmgr.exe 34 PID 2696 wrote to memory of 2852 2696 rundll32mgrmgr.exe 34 PID 2696 wrote to memory of 2852 2696 rundll32mgrmgr.exe 34 PID 2696 wrote to memory of 2852 2696 rundll32mgrmgr.exe 34
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9f346e84baa5b20e4b3807c9ac04f75704db01abea2e47b2f9ed38dddb567402N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9f346e84baa5b20e4b3807c9ac04f75704db01abea2e47b2f9ed38dddb567402N.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\rundll32mgrmgr.exeC:\Windows\SysWOW64\rundll32mgrmgr.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2696 -s 1565⤵
- Loads dropped DLL
- Program crash
PID:2852
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2840 -s 1524⤵
- Loads dropped DLL
- Program crash
PID:2724
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
810KB
MD5edce3981e4e65a056cdd5ee6a8560264
SHA1904eec1da309c9ade0c4f8f567f64d9593f3c1b2
SHA2562c6947b14268a8f69028f1597e81f80bcd1b5ce3a5fa99a343666bca064aa03d
SHA5123a7390909998679989383e42d0db172c28a1986ccc7e9de91f4a0aa0f805921e5c42a07d5f2e27c7ab0042c3cd42d445edc884d00465b73fe056e01ddb73b6fa
-
Filesize
404KB
MD53a51be334f3cedd7185130cd60047496
SHA15572a04718cffb848ae660713415b8ab95b3ec5c
SHA2563e6d0b2887dad2ea3845139a31dfc8b8a2923c3f58ae8ba241d1498e1cc7747b
SHA512ed2dda92f22f1d972508ede37cf6b8cf719e1d53271c2af988fe700e53f4ca0feb7e39712135e1c128f63ebf08ee6a555f35b555243c233afc943a22c9fe5783