Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-01-2025 09:20
Behavioral task
behavioral1
Sample
92abc40838b2e70ab3e0944f0c7d965e74c8073c4cacf63f467d3107c22fa92eN.dll
Resource
win7-20240903-en
5 signatures
120 seconds
General
-
Target
92abc40838b2e70ab3e0944f0c7d965e74c8073c4cacf63f467d3107c22fa92eN.dll
-
Size
76KB
-
MD5
aa16437cc3335c05bba12f9912ca81b0
-
SHA1
3ffbf75ab25656a4702bb5f1c52dd1047338e085
-
SHA256
92abc40838b2e70ab3e0944f0c7d965e74c8073c4cacf63f467d3107c22fa92e
-
SHA512
81a983c595e00bacc3a7ffc2429cbba5089d9e87bda1e0e0e4bff0e1c22360214b2e0e8becb7695bec11bd317235c9244ee6a045e2f39b5079380cd8b4686b84
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7Z/C4MLwaB+:c8y93KQjy7G55riF1cMo03FCBLBB+
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2484-2-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2484-1-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2484-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2484-3-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 816 2484 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2484 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1016 wrote to memory of 2484 1016 rundll32.exe 30 PID 1016 wrote to memory of 2484 1016 rundll32.exe 30 PID 1016 wrote to memory of 2484 1016 rundll32.exe 30 PID 1016 wrote to memory of 2484 1016 rundll32.exe 30 PID 1016 wrote to memory of 2484 1016 rundll32.exe 30 PID 1016 wrote to memory of 2484 1016 rundll32.exe 30 PID 1016 wrote to memory of 2484 1016 rundll32.exe 30 PID 2484 wrote to memory of 816 2484 rundll32.exe 31 PID 2484 wrote to memory of 816 2484 rundll32.exe 31 PID 2484 wrote to memory of 816 2484 rundll32.exe 31 PID 2484 wrote to memory of 816 2484 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\92abc40838b2e70ab3e0944f0c7d965e74c8073c4cacf63f467d3107c22fa92eN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\92abc40838b2e70ab3e0944f0c7d965e74c8073c4cacf63f467d3107c22fa92eN.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 3243⤵
- Program crash
PID:816
-
-