Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/01/2025, 05:29
Behavioral task
behavioral1
Sample
fbb24dbc8d8c1fdcb9f7689a3b4ad665aa9af410457ba5e93d10a22ef0460989.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fbb24dbc8d8c1fdcb9f7689a3b4ad665aa9af410457ba5e93d10a22ef0460989.dll
Resource
win10v2004-20241007-en
General
-
Target
fbb24dbc8d8c1fdcb9f7689a3b4ad665aa9af410457ba5e93d10a22ef0460989.dll
-
Size
165KB
-
MD5
f05bbb8b4c3eebcb821fd55a716dc222
-
SHA1
215e60a763b4a2a780f16f291d2ad19e53a1f6d3
-
SHA256
fbb24dbc8d8c1fdcb9f7689a3b4ad665aa9af410457ba5e93d10a22ef0460989
-
SHA512
a20a27b69ff0cc7e6b493400275faebdf05c8d2613a37c2e7fad2dc20588c7436bc79ce3c9a1aaa8adac2dab0baa5be399f68a0c6347e87789ba0e423f9e8bd5
-
SSDEEP
3072:oJ8IMILmCa3yx6oFEdgVXnF1P1duA9TSiMgSp:bkmCaiEoFEd+FhuAgiMV
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2328 2088 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2088 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1804 wrote to memory of 2088 1804 rundll32.exe 30 PID 1804 wrote to memory of 2088 1804 rundll32.exe 30 PID 1804 wrote to memory of 2088 1804 rundll32.exe 30 PID 1804 wrote to memory of 2088 1804 rundll32.exe 30 PID 1804 wrote to memory of 2088 1804 rundll32.exe 30 PID 1804 wrote to memory of 2088 1804 rundll32.exe 30 PID 1804 wrote to memory of 2088 1804 rundll32.exe 30 PID 2088 wrote to memory of 2328 2088 rundll32.exe 31 PID 2088 wrote to memory of 2328 2088 rundll32.exe 31 PID 2088 wrote to memory of 2328 2088 rundll32.exe 31 PID 2088 wrote to memory of 2328 2088 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbb24dbc8d8c1fdcb9f7689a3b4ad665aa9af410457ba5e93d10a22ef0460989.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbb24dbc8d8c1fdcb9f7689a3b4ad665aa9af410457ba5e93d10a22ef0460989.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2088 -s 2763⤵
- Program crash
PID:2328
-
-