Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2025 09:18
Behavioral task
behavioral1
Sample
0c84024ebb5a07ce468894d9ca7f656be56c77e59a3af7231861a577a7d91792.dll
Resource
win7-20240729-en
5 signatures
120 seconds
General
-
Target
0c84024ebb5a07ce468894d9ca7f656be56c77e59a3af7231861a577a7d91792.dll
-
Size
76KB
-
MD5
c655e38d1c46b251c89b14a9e7016c98
-
SHA1
8547d9ad8cf3615fc6ff3c8c910d45c06df596ac
-
SHA256
0c84024ebb5a07ce468894d9ca7f656be56c77e59a3af7231861a577a7d91792
-
SHA512
13068eeee0cfdc43ec9c62997d93fba3eff77171060866ad97cb41ba36f3722a1dd8438e7ec155cb009aa18e5181d57269cf4229d7a8b42774a82120e47ab3ca
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7Zh/3Zdc6XhR:c8y93KQjy7G55riF1cMo03j/Jd1j
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4328-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/4328-1-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2784 4328 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4328 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2920 wrote to memory of 4328 2920 rundll32.exe 82 PID 2920 wrote to memory of 4328 2920 rundll32.exe 82 PID 2920 wrote to memory of 4328 2920 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0c84024ebb5a07ce468894d9ca7f656be56c77e59a3af7231861a577a7d91792.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0c84024ebb5a07ce468894d9ca7f656be56c77e59a3af7231861a577a7d91792.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4328 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 7003⤵
- Program crash
PID:2784
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4328 -ip 43281⤵PID:2132