Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/01/2025, 01:05
Behavioral task
behavioral1
Sample
81b6f3adfb5004abe6fc1a5358ad286fb726a8bbc6d2aaaed70ef1f185e8272eN.dll
Resource
win7-20240903-en
5 signatures
120 seconds
General
-
Target
81b6f3adfb5004abe6fc1a5358ad286fb726a8bbc6d2aaaed70ef1f185e8272eN.dll
-
Size
76KB
-
MD5
8718dacda6c100ebf8765a719cbffaf0
-
SHA1
e771ac86648f1495260ab570fbd02f7f0acfa7f7
-
SHA256
81b6f3adfb5004abe6fc1a5358ad286fb726a8bbc6d2aaaed70ef1f185e8272e
-
SHA512
0d9d88d4611f3b49e42d49e8358c3b52e1cba0df8f095c8343f9ae2ee37a91d17e9fb0767ffefddcbc5a161b4861a4cbca6c80d2ed9c5e924c25bcddff836528
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZwQL+tmPL:c8y93KQjy7G55riF1cMo03GC+t+L
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1316-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/1316-1-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1220 1316 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1316 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2876 wrote to memory of 1316 2876 rundll32.exe 82 PID 2876 wrote to memory of 1316 2876 rundll32.exe 82 PID 2876 wrote to memory of 1316 2876 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\81b6f3adfb5004abe6fc1a5358ad286fb726a8bbc6d2aaaed70ef1f185e8272eN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\81b6f3adfb5004abe6fc1a5358ad286fb726a8bbc6d2aaaed70ef1f185e8272eN.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 7123⤵
- Program crash
PID:1220
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1316 -ip 13161⤵PID:3324