Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 01:59
Behavioral task
behavioral1
Sample
5908fd25133b4bda6316b95f1b82465ca36aac6aaee8394841b4e1a99588f131N.dll
Resource
win7-20240708-en
5 signatures
120 seconds
General
-
Target
5908fd25133b4bda6316b95f1b82465ca36aac6aaee8394841b4e1a99588f131N.dll
-
Size
76KB
-
MD5
e9ef06e6742a9f2d892329f89d845780
-
SHA1
5438893a77c2ad00eb94c7af3a50762841650eaa
-
SHA256
5908fd25133b4bda6316b95f1b82465ca36aac6aaee8394841b4e1a99588f131
-
SHA512
2e1f0b5965a2bb2d49d3b7a899b7e3a8d4d903a753b91cb4f21067088c63ac71c30991aa48cc94ed8b10253b680d399d8171dff36f96b5865db4958f87b27a29
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZEVZ:c8y93KQjy7G55riF1cMo03q
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3588-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/3588-1-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2512 3588 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3588 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3696 wrote to memory of 3588 3696 rundll32.exe 82 PID 3696 wrote to memory of 3588 3696 rundll32.exe 82 PID 3696 wrote to memory of 3588 3696 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5908fd25133b4bda6316b95f1b82465ca36aac6aaee8394841b4e1a99588f131N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5908fd25133b4bda6316b95f1b82465ca36aac6aaee8394841b4e1a99588f131N.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3588 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 7123⤵
- Program crash
PID:2512
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3588 -ip 35881⤵PID:3540