Analysis
-
max time kernel
94s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-01-2025 05:57
Behavioral task
behavioral1
Sample
e75fda3e5f848d514554319f2d40bfe8e1b3c2063891cd8b32fc514a169267d5.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e75fda3e5f848d514554319f2d40bfe8e1b3c2063891cd8b32fc514a169267d5.dll
Resource
win10v2004-20241007-en
General
-
Target
e75fda3e5f848d514554319f2d40bfe8e1b3c2063891cd8b32fc514a169267d5.dll
-
Size
76KB
-
MD5
a50797c50562c544f0501232a955043e
-
SHA1
b7935d36349a039e8acda1869d5eca95e453f1e4
-
SHA256
e75fda3e5f848d514554319f2d40bfe8e1b3c2063891cd8b32fc514a169267d5
-
SHA512
fa0db96cb9a72bfd40c0f657835ee30e2e6ca35acb5d996f73fe707719876ae31385fd7a99914d0fbdb86494ed4e9e3f60de82284a2e18f26e94de1f71f611fe
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZWqy0Mq+:c8y93KQjy7G55riF1cMo03Ty0+
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
resource yara_rule behavioral2/memory/5084-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/5084-1-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3036 5084 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5084 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2012 wrote to memory of 5084 2012 rundll32.exe 83 PID 2012 wrote to memory of 5084 2012 rundll32.exe 83 PID 2012 wrote to memory of 5084 2012 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e75fda3e5f848d514554319f2d40bfe8e1b3c2063891cd8b32fc514a169267d5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e75fda3e5f848d514554319f2d40bfe8e1b3c2063891cd8b32fc514a169267d5.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5084 -s 7203⤵
- Program crash
PID:3036
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5084 -ip 50841⤵PID:3108