Overview
overview
10Static
static
3CtsJrk922y...hu.dll
windows10-2004-x64
3Gm8nhdPr6F...b8.dll
windows10-2004-x64
3HsSGqhA8hLnRhzEU.exe
windows10-2004-x64
10N3t5RKDARs...s5.dll
windows10-2004-x64
3Uy9ey23Uew...rM.dll
windows10-2004-x64
3WagxdrGrZF...Gd.dll
windows10-2004-x64
3XS3RCrw6cja4k37R.exe
windows10-2004-x64
10apc.exe
windows10-2004-x64
10eQc4AK3Pa7...ma.dll
windows10-2004-x64
3kXAm48Kxap...HJ.dll
windows10-2004-x64
3ran.exe
windows10-2004-x64
3settup.exe
windows10-2004-x64
10t44fqRsSRC...7a.dll
windows10-2004-x64
3yQfWHCcHZB...8p.dll
windows10-2004-x64
3Analysis
-
max time kernel
30s -
max time network
22s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 01:27
Static task
static1
Behavioral task
behavioral1
Sample
CtsJrk922yCsVz5Ft2hu.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Gm8nhdPr6FaS3JrvM3b8.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
HsSGqhA8hLnRhzEU.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
N3t5RKDARsCt3RFW6gs5.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Uy9ey23Uewvje3r5nUrM.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
WagxdrGrZF8Wh8KQzsGd.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
XS3RCrw6cja4k37R.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
apc.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
eQc4AK3Pa7bAmp6b8gma.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral10
Sample
kXAm48KxapgrcVSF2hHJ.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
ran.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral12
Sample
settup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
t44fqRsSRCmz8Q8Nxk7a.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral14
Sample
yQfWHCcHZBxkae69c58p.dll
Resource
win10v2004-20241007-en
General
-
Target
eQc4AK3Pa7bAmp6b8gma.dll
-
Size
468KB
-
MD5
07da7a30c7c6c64264fcd80e66d59db1
-
SHA1
11e62ed62744a29962ae522340bbee7382363e25
-
SHA256
cc7f7fd56b62ebe7d4a8b8ee07ee170350149dae643ce0b002e7daf08e113545
-
SHA512
ec1f612d49896cfdc74f176a9dfae18a34322173125aec25f19e0fccaf62f8aa5f5f568b4894f553bc045b67997c26a410a72b7d9b5a00c61eab4624cbeab10f
-
SSDEEP
12288:0RvMxmp/bqplWdBCu5DVA5BLR+51H/XOp/:058S/OvcQlR+5l/XC
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1608 2388 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3380 wrote to memory of 2388 3380 rundll32.exe 84 PID 3380 wrote to memory of 2388 3380 rundll32.exe 84 PID 3380 wrote to memory of 2388 3380 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eQc4AK3Pa7bAmp6b8gma.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eQc4AK3Pa7bAmp6b8gma.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2388 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 6523⤵
- Program crash
PID:1608
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2388 -ip 23881⤵PID:2380