Analysis
-
max time kernel
92s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2025 14:11
Behavioral task
behavioral1
Sample
244cfb2060c51850d8fd4f82542eb3ebc18336ed07d34f543acad9b68c067aa2.dll
Resource
win7-20241010-en
5 signatures
120 seconds
General
-
Target
244cfb2060c51850d8fd4f82542eb3ebc18336ed07d34f543acad9b68c067aa2.dll
-
Size
76KB
-
MD5
21362cab76ea6dae97ed3976ac698306
-
SHA1
dc3093e3cdb7e7f7ec0a05abb219be061e62e9c2
-
SHA256
244cfb2060c51850d8fd4f82542eb3ebc18336ed07d34f543acad9b68c067aa2
-
SHA512
8300c8517b30a0a948b2792fe8c25a2808a62ed311a0c49b3a0ded5657a2bb6220f1d17517cce2470edec066096cb9a5b2b6ed482a3dfa3c8807de9c44b01acb
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZLWZH/:c8y93KQjy7G55riF1cMo03wH/
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2832-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/2832-2-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1400 2832 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2832 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 672 wrote to memory of 2832 672 rundll32.exe 83 PID 672 wrote to memory of 2832 672 rundll32.exe 83 PID 672 wrote to memory of 2832 672 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\244cfb2060c51850d8fd4f82542eb3ebc18336ed07d34f543acad9b68c067aa2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\244cfb2060c51850d8fd4f82542eb3ebc18336ed07d34f543acad9b68c067aa2.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2832 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 7163⤵
- Program crash
PID:1400
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2832 -ip 28321⤵PID:3624