Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2025 10:16
Static task
static1
Behavioral task
behavioral1
Sample
bodjro.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
bodjro.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
wincr.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
wincr.dll
Resource
win10v2004-20241007-en
General
-
Target
wincr.dll
-
Size
671KB
-
MD5
2730df29ffd09125393452bea2fc7109
-
SHA1
9b83e1b375e2f6614e84ea2c3bdce127cc191f41
-
SHA256
449844d3497bb58c231051a95b9868a5854e90efe2a683f1fbe42541f9d768c7
-
SHA512
3b56394d2e3ff8466a00cddb09375057c1aedb5d5ef320a926052155ed3514e175ffcf816ec5d120f834d11cb303bd869ed294eaa9e225e0819ec106d960b0e6
-
SSDEEP
12288:FeUg6c/GuwcjRdBeoeZlVje1/TVk6q4NA:0Ug6cFdeZZlS/
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3232 2348 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1448 wrote to memory of 2348 1448 rundll32.exe 82 PID 1448 wrote to memory of 2348 1448 rundll32.exe 82 PID 1448 wrote to memory of 2348 1448 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\wincr.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\wincr.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2348 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 6563⤵
- Program crash
PID:3232
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2348 -ip 23481⤵PID:3092