Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 10:57
Behavioral task
behavioral1
Sample
553d0bec3ca008c7d6e00b877f597cc2f8bf23e65b7a63a715e0e212271a5eccN.dll
Resource
win7-20240903-en
windows7-x64
6 signatures
120 seconds
General
-
Target
553d0bec3ca008c7d6e00b877f597cc2f8bf23e65b7a63a715e0e212271a5eccN.dll
-
Size
76KB
-
MD5
0b860a510a4a21866cfc72e7f723e220
-
SHA1
9649d0f2872dd69609179c32b027e1e53b5a698c
-
SHA256
553d0bec3ca008c7d6e00b877f597cc2f8bf23e65b7a63a715e0e212271a5ecc
-
SHA512
3542bad135321a9a77f36a5223692030af589492c76cc7d9e988f892d6fa951b42ff097a1f540e96567edd78984b8e7157f4ea35531d11bc3b5d099535cc0e1e
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZLV2D:c8y93KQjy7G55riF1cMo03BV2D
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1852-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/1852-1-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1696 1852 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1852 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1628 wrote to memory of 1852 1628 rundll32.exe 83 PID 1628 wrote to memory of 1852 1628 rundll32.exe 83 PID 1628 wrote to memory of 1852 1628 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\553d0bec3ca008c7d6e00b877f597cc2f8bf23e65b7a63a715e0e212271a5eccN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\553d0bec3ca008c7d6e00b877f597cc2f8bf23e65b7a63a715e0e212271a5eccN.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1852 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 7083⤵
- Program crash
PID:1696
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1852 -ip 18521⤵PID:2164