Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2025, 12:48
Behavioral task
behavioral1
Sample
7b22dc9c1f9227c92ac5f67631b3940c31e7d7e7a2447c2769f682d855657a7e.dll
Resource
win7-20240903-en
6 signatures
120 seconds
General
-
Target
7b22dc9c1f9227c92ac5f67631b3940c31e7d7e7a2447c2769f682d855657a7e.dll
-
Size
76KB
-
MD5
d6ee1c9d4833a4f03f9a8fc996bde282
-
SHA1
ee7b15b7ed533a6b2c53bb403fc27088fa7353b4
-
SHA256
7b22dc9c1f9227c92ac5f67631b3940c31e7d7e7a2447c2769f682d855657a7e
-
SHA512
a225ac6abcc0edcd63fa59a2beceb0ed8d59fc90d887b657e9babf2a459b60692d28168d02f06b678d4968b88c319f4c7d1b4e0f69a242dfa45707a03bf759df
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZGXStYUqMuz3:c8y93KQjy7G55riF1cMo039tYU+
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4988-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/4988-1-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3980 4988 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4988 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1560 wrote to memory of 4988 1560 rundll32.exe 83 PID 1560 wrote to memory of 4988 1560 rundll32.exe 83 PID 1560 wrote to memory of 4988 1560 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7b22dc9c1f9227c92ac5f67631b3940c31e7d7e7a2447c2769f682d855657a7e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7b22dc9c1f9227c92ac5f67631b3940c31e7d7e7a2447c2769f682d855657a7e.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 7043⤵
- Program crash
PID:3980
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4988 -ip 49881⤵PID:4116