Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 22:22
Static task
static1
Behavioral task
behavioral1
Sample
276da67100830bf7791e788022716f1a730118b3b6b8956dc732893653f0a83c.dll
Resource
win7-20240903-en
General
-
Target
276da67100830bf7791e788022716f1a730118b3b6b8956dc732893653f0a83c.dll
-
Size
144KB
-
MD5
57cb789b0c748b0a4f930a0e353a23e4
-
SHA1
3dfe3d6a8cbe1362063b6df7dd247ec9e0f1f842
-
SHA256
276da67100830bf7791e788022716f1a730118b3b6b8956dc732893653f0a83c
-
SHA512
542c7e05b30935c4c23f7f25e62bd8d3ea8c55ed208be55e8b72a1d9e9eba72fb76ad7eeb5f4e2e4baac0f965e08a223e1cbda95b45625297f18b1ef8a7ed4b9
-
SSDEEP
3072:sdSdb6JJWj6QGFOTRM5Yry8cOHz4zUkpgzag:sdSJ6nWGvFOdM5YT4zUkpsag
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4220 rundll32mgr.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
resource yara_rule behavioral2/files/0x0009000000023c8e-3.dat upx behavioral2/memory/4220-5-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/4220-8-0x0000000000400000-0x000000000045D000-memory.dmp upx -
Program crash 2 IoCs
pid pid_target Process procid_target 5068 3020 WerFault.exe 83 3668 4220 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4004 wrote to memory of 3020 4004 rundll32.exe 83 PID 4004 wrote to memory of 3020 4004 rundll32.exe 83 PID 4004 wrote to memory of 3020 4004 rundll32.exe 83 PID 3020 wrote to memory of 4220 3020 rundll32.exe 84 PID 3020 wrote to memory of 4220 3020 rundll32.exe 84 PID 3020 wrote to memory of 4220 3020 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\276da67100830bf7791e788022716f1a730118b3b6b8956dc732893653f0a83c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\276da67100830bf7791e788022716f1a730118b3b6b8956dc732893653f0a83c.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4220 -s 2644⤵
- Program crash
PID:3668
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 6083⤵
- Program crash
PID:5068
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4220 -ip 42201⤵PID:3744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3020 -ip 30201⤵PID:1280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD57550804dcb2dd83c3383835d26d750fd
SHA1fc22ba558f6251ced1b9ba0117d23b8cfdcc8f2f
SHA25622365d7b52523ed42509ed9d80eb32a1094ffe39946e6016ff678713053412f5
SHA51201cd7e614c25c9213ad439d4996780d510107ab9ddb904f78d19b2c583d22901fb29cae5459a8203214b968736403d9f5ff6adf94019186008f4b9806a28e884