Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2025, 16:20
Behavioral task
behavioral1
Sample
f5f90f6c4cf591f5b6850f31115ed027d36fb1163b352b21ee9c424088576f1aN.dll
Resource
win7-20240729-en
6 signatures
120 seconds
General
-
Target
f5f90f6c4cf591f5b6850f31115ed027d36fb1163b352b21ee9c424088576f1aN.dll
-
Size
76KB
-
MD5
6e45b3e0af89e9defa9d56535f15a4a0
-
SHA1
c252a9412767b73707491dc3468f0a67457c705e
-
SHA256
f5f90f6c4cf591f5b6850f31115ed027d36fb1163b352b21ee9c424088576f1a
-
SHA512
35699023ff4e7bbbf15eaf1acaf3ff47beb0cb2ba05b842459e0806a813764772a3a400552acd949012b7abdaeac7e669594875ff5e1d8da739e9115806c996d
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZGXStYUqMuz1:c8y93KQjy7G55riF1cMo039tYUq
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4380-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/4380-1-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 740 4380 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4380 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2384 wrote to memory of 4380 2384 rundll32.exe 83 PID 2384 wrote to memory of 4380 2384 rundll32.exe 83 PID 2384 wrote to memory of 4380 2384 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5f90f6c4cf591f5b6850f31115ed027d36fb1163b352b21ee9c424088576f1aN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5f90f6c4cf591f5b6850f31115ed027d36fb1163b352b21ee9c424088576f1aN.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4380 -s 7043⤵
- Program crash
PID:740
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4380 -ip 43801⤵PID:872