Analysis
-
max time kernel
99s -
max time network
144s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
22-01-2025 02:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
wincr.dll
Resource
win10ltsc2021-20250113-en
windows10-ltsc 2021-x64
3 signatures
150 seconds
General
-
Target
wincr.dll
-
Size
691KB
-
MD5
9a8228f90ed236a1bd3921ba84b2b8a9
-
SHA1
15040812b5b49ea3171c921ae47328746ac1f98c
-
SHA256
5cfd086b45e6975f4eed393e08725b01a7c69894f7a7c89bf3bec7337fcc4264
-
SHA512
283066eda69749fb6d83e3b239a45d3d4d358dcfc1bcece023337413e99a8a6cbec27581e6c46cc0b9fd87837abb1b235e10b3912f0b23d2beec39d97786c3d0
-
SSDEEP
12288:7tSakCkI4M23WNcDK2r7nreK6RrrNEGyf:7tSPC7XNcDrr7nrPQrk
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4488 1044 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4368 wrote to memory of 1044 4368 rundll32.exe 83 PID 4368 wrote to memory of 1044 4368 rundll32.exe 83 PID 4368 wrote to memory of 1044 4368 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\wincr.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\wincr.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1044 -s 6763⤵
- Program crash
PID:4488
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1044 -ip 10441⤵PID:2860