Analysis
-
max time kernel
93s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 21:06
Behavioral task
behavioral1
Sample
169c463a14f021ebdf9d2a51476faba32921518ed33fcd35ae3d738bc6056f13N.dll
Resource
win7-20241023-en
windows7-x64
5 signatures
120 seconds
General
-
Target
169c463a14f021ebdf9d2a51476faba32921518ed33fcd35ae3d738bc6056f13N.dll
-
Size
76KB
-
MD5
d2dedfb3910bf59a0e384a5bf8d466a0
-
SHA1
2aea6677a4f33611a0ccbbdced9fd5dd5e18fb9c
-
SHA256
169c463a14f021ebdf9d2a51476faba32921518ed33fcd35ae3d738bc6056f13
-
SHA512
fdf71949bf5766bbb071bce4491ec9dd455c90d5aa044b1d8a9d096c9ca316a9cb40d767cf21dda6e4002ab0d061ca5dd460dfb2b84ea303caf6b062e6dfed9c
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZlFwoQC2mCX5FA5:c8y93KQjy7G55riF1cMo03LF1QC2mCXu
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4548-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/4548-1-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4928 4548 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4548 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4484 wrote to memory of 4548 4484 rundll32.exe 83 PID 4484 wrote to memory of 4548 4484 rundll32.exe 83 PID 4484 wrote to memory of 4548 4484 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\169c463a14f021ebdf9d2a51476faba32921518ed33fcd35ae3d738bc6056f13N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\169c463a14f021ebdf9d2a51476faba32921518ed33fcd35ae3d738bc6056f13N.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 7043⤵
- Program crash
PID:4928
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4548 -ip 45481⤵PID:4896