Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-01-2025 09:19
Behavioral task
behavioral1
Sample
484db1b719f1f83fef3a54f10dd85c6a0711ce742e4bfe52e0b40f07038dd518N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
484db1b719f1f83fef3a54f10dd85c6a0711ce742e4bfe52e0b40f07038dd518N.dll
Resource
win10v2004-20241007-en
General
-
Target
484db1b719f1f83fef3a54f10dd85c6a0711ce742e4bfe52e0b40f07038dd518N.dll
-
Size
76KB
-
MD5
11f4fb88e8483a9c8bc4466bbf3e7900
-
SHA1
39e69f8bba0946c67c4b61396991ba9abb183cb1
-
SHA256
484db1b719f1f83fef3a54f10dd85c6a0711ce742e4bfe52e0b40f07038dd518
-
SHA512
20a3c432661fb292df64c865e5451907a52ca4dafad6262dd5272585ec1638e3b4136611751dd57ae06ccfa7807ad3237d82ea45ea641a4358542c37d65f4dd7
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7Zt2TvN:c8y93KQjy7G55riF1cMo03f2TvN
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
resource yara_rule behavioral2/memory/3672-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/3672-1-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2600 3672 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3672 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4184 wrote to memory of 3672 4184 rundll32.exe 82 PID 4184 wrote to memory of 3672 4184 rundll32.exe 82 PID 4184 wrote to memory of 3672 4184 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\484db1b719f1f83fef3a54f10dd85c6a0711ce742e4bfe52e0b40f07038dd518N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\484db1b719f1f83fef3a54f10dd85c6a0711ce742e4bfe52e0b40f07038dd518N.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 7123⤵
- Program crash
PID:2600
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3672 -ip 36721⤵PID:3056