Overview
overview
10Static
static
3CtsJrk922y...hu.dll
windows10-2004-x64
3Gm8nhdPr6F...b8.dll
windows10-2004-x64
3HsSGqhA8hLnRhzEU.exe
windows10-2004-x64
10N3t5RKDARs...s5.dll
windows10-2004-x64
3Uy9ey23Uew...rM.dll
windows10-2004-x64
3WagxdrGrZF...Gd.dll
windows10-2004-x64
3XS3RCrw6cja4k37R.exe
windows10-2004-x64
10apc.exe
windows10-2004-x64
10eQc4AK3Pa7...ma.dll
windows10-2004-x64
3kXAm48Kxap...HJ.dll
windows10-2004-x64
3ran.exe
windows10-2004-x64
3settup.exe
windows10-2004-x64
10t44fqRsSRC...7a.dll
windows10-2004-x64
3yQfWHCcHZB...8p.dll
windows10-2004-x64
3Analysis
-
max time kernel
30s -
max time network
26s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 01:27
Static task
static1
Behavioral task
behavioral1
Sample
CtsJrk922yCsVz5Ft2hu.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Gm8nhdPr6FaS3JrvM3b8.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
HsSGqhA8hLnRhzEU.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
N3t5RKDARsCt3RFW6gs5.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Uy9ey23Uewvje3r5nUrM.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
WagxdrGrZF8Wh8KQzsGd.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
XS3RCrw6cja4k37R.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
apc.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
eQc4AK3Pa7bAmp6b8gma.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral10
Sample
kXAm48KxapgrcVSF2hHJ.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
ran.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral12
Sample
settup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
t44fqRsSRCmz8Q8Nxk7a.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral14
Sample
yQfWHCcHZBxkae69c58p.dll
Resource
win10v2004-20241007-en
General
-
Target
CtsJrk922yCsVz5Ft2hu.dll
-
Size
136KB
-
MD5
025ef85aa978697c32e03486dcea78bb
-
SHA1
aed8d9e8f56679591d73ee96db9463db3fbf1feb
-
SHA256
16dcd685d0210a0bf7378bbfac6cef7514fa4eec93968708801dae28f243be5f
-
SHA512
350995d0c1207130dc55b706f400639afd3f608428a45e1754964224d17d7bc9daba6a49bf9f1b787575c6045ba1fbfc30ae41531c8c2ce538da987e0307b367
-
SSDEEP
3072:euv02y7DXxgppeKwgBSRint5ceZzHkmFIlxe40RkL:ec4ELwgARwt5ceXFIlxrJL
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3400 4356 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1296 wrote to memory of 4356 1296 rundll32.exe 85 PID 1296 wrote to memory of 4356 1296 rundll32.exe 85 PID 1296 wrote to memory of 4356 1296 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\CtsJrk922yCsVz5Ft2hu.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\CtsJrk922yCsVz5Ft2hu.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4356 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4356 -s 6403⤵
- Program crash
PID:3400
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 4356 -ip 43561⤵PID:1376