Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 14:04
Behavioral task
behavioral1
Sample
54ac5d4168cc45cd90f90f9cc0e6be5ea3d00e4f094e766d4e0aea5041990896N.dll
Resource
win7-20240903-en
windows7-x64
5 signatures
120 seconds
General
-
Target
54ac5d4168cc45cd90f90f9cc0e6be5ea3d00e4f094e766d4e0aea5041990896N.dll
-
Size
76KB
-
MD5
de493fc5cb9337101c7b180efecfa9f0
-
SHA1
91423f6b97052ee806ea10e9c0e71cc5456b74bf
-
SHA256
54ac5d4168cc45cd90f90f9cc0e6be5ea3d00e4f094e766d4e0aea5041990896
-
SHA512
507f6d4867a1cd3f6ec77ce402321e7c15f45d910a0ddb97a29bf1adefc1cb91d5efba696ef5aa022ef8fb56d7a30bb027ee824dcae049c58f752731a084bd97
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7Zn1C+Pa:c8y93KQjy7G55riF1cMo0378
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2320-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/2320-2-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2384 2320 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2320 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2320 2040 rundll32.exe 83 PID 2040 wrote to memory of 2320 2040 rundll32.exe 83 PID 2040 wrote to memory of 2320 2040 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\54ac5d4168cc45cd90f90f9cc0e6be5ea3d00e4f094e766d4e0aea5041990896N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\54ac5d4168cc45cd90f90f9cc0e6be5ea3d00e4f094e766d4e0aea5041990896N.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2320 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2320 -s 7123⤵
- Program crash
PID:2384
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2320 -ip 23201⤵PID:3336