Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-01-2025 05:02
Static task
static1
Behavioral task
behavioral1
Sample
fd95341188e806c0394accebbce84a3b3dd82c5e5263bc3f9737e96c3008d6e3.dll
Resource
win7-20240903-en
General
-
Target
fd95341188e806c0394accebbce84a3b3dd82c5e5263bc3f9737e96c3008d6e3.dll
-
Size
554KB
-
MD5
cd9488a8aed4b4fb5836d6ae10a897a1
-
SHA1
3db525aff61e107cdd9ed9e0ce839ee583408c07
-
SHA256
fd95341188e806c0394accebbce84a3b3dd82c5e5263bc3f9737e96c3008d6e3
-
SHA512
fe6b175586f3ac893e3ac530290b7e180fabc604ae198d969f492258a4afac3399e1cca31fc3fffa7c8928bd7ebd47dd928e76819c1e88d48e3802ac3c40d368
-
SSDEEP
12288:ah8fZLyb9PzVMBC/HVMOp4PkxHLCYwZckMQMNvrm4O9rR+:a8F+Pzr/Hfp4MIYwZckMQmvrmn8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2556 rundll32mgr.exe -
Loads dropped DLL 9 IoCs
pid Process 1904 rundll32.exe 1904 rundll32.exe 1264 WerFault.exe 1264 WerFault.exe 1264 WerFault.exe 1264 WerFault.exe 1264 WerFault.exe 1264 WerFault.exe 1264 WerFault.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1264 2556 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2536 wrote to memory of 1904 2536 rundll32.exe 30 PID 2536 wrote to memory of 1904 2536 rundll32.exe 30 PID 2536 wrote to memory of 1904 2536 rundll32.exe 30 PID 2536 wrote to memory of 1904 2536 rundll32.exe 30 PID 2536 wrote to memory of 1904 2536 rundll32.exe 30 PID 2536 wrote to memory of 1904 2536 rundll32.exe 30 PID 2536 wrote to memory of 1904 2536 rundll32.exe 30 PID 1904 wrote to memory of 2556 1904 rundll32.exe 31 PID 1904 wrote to memory of 2556 1904 rundll32.exe 31 PID 1904 wrote to memory of 2556 1904 rundll32.exe 31 PID 1904 wrote to memory of 2556 1904 rundll32.exe 31 PID 2556 wrote to memory of 1264 2556 rundll32mgr.exe 32 PID 2556 wrote to memory of 1264 2556 rundll32mgr.exe 32 PID 2556 wrote to memory of 1264 2556 rundll32mgr.exe 32 PID 2556 wrote to memory of 1264 2556 rundll32mgr.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fd95341188e806c0394accebbce84a3b3dd82c5e5263bc3f9737e96c3008d6e3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fd95341188e806c0394accebbce84a3b3dd82c5e5263bc3f9737e96c3008d6e3.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2556 -s 924⤵
- Loads dropped DLL
- Program crash
PID:1264
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
119KB
MD56cfb85f1741b245f7c7774de1107e0fa
SHA159cbd10ae2cd0142fc090345fc59ccf4973030a4
SHA2569865c7b2dd93dd0292508153a19398804630e1f41d8850421679786be6fead9e
SHA5120a58981b86d9051ce13558571bad1c879e04cd1204ca6cac942cdace59ff2fdd1d985ff881dbaf54bdd7a745ba4358128781126dbc472892c3a2281fe3262681