Analysis
-
max time kernel
94s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-es -
resource tags
arch:x64arch:x86image:win10v2004-20241007-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
10-01-2025 06:03
Static task
static1
Behavioral task
behavioral1
Sample
FACTURAS PENDIENTES VAYPER AUTOMOCION 1.exe
Resource
win7-20241023-es
Behavioral task
behavioral2
Sample
FACTURAS PENDIENTES VAYPER AUTOMOCION 1.exe
Resource
win10v2004-20241007-es
Behavioral task
behavioral3
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240903-es
Behavioral task
behavioral4
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20241007-es
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-es
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-es
General
-
Target
$PLUGINSDIR/LangDLL.dll
-
Size
5KB
-
MD5
e459f344b4a47af2cf15d821f3946724
-
SHA1
5df805fcf0a857b98cecca139b2ea99979c8f01e
-
SHA256
f4778b8aca1eb5d93d267468589b4bf45b827a50300eb552d796e9dc22ade419
-
SHA512
5b8285a166404c73869d5aaa25c5af3544ab4a2f012c5ea1e12b04a1d6fa3d32b4a6857e9fd29dd3c86dd5dc8111e3e86de11bdb5496c1c527ff1bc91bd791bb
-
SSDEEP
48:qbrtDVP10LgQL8QRU8IlmWm7WmnuWK8hSemoMqG5QEv8sF9U3ofMU:UVPFQIqlemWm7WmTaehG+EkR
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4564 4916 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3476 wrote to memory of 4916 3476 rundll32.exe 82 PID 3476 wrote to memory of 4916 3476 rundll32.exe 82 PID 3476 wrote to memory of 4916 3476 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\LangDLL.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\LangDLL.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4916 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 6003⤵
- Program crash
PID:4564
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4916 -ip 49161⤵PID:2344