Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2025 15:14
Behavioral task
behavioral1
Sample
dc9c7025edaccbc2ad709d485fe303767c56a64cdc94b124ce9538305787f225.dll
Resource
win7-20241023-en
windows7-x64
5 signatures
120 seconds
General
-
Target
dc9c7025edaccbc2ad709d485fe303767c56a64cdc94b124ce9538305787f225.dll
-
Size
76KB
-
MD5
fb8bcaf257ad7bdbdb1c29bb779f4624
-
SHA1
3a1d97de697615f89553d98fbcaef1e702d2bfb0
-
SHA256
dc9c7025edaccbc2ad709d485fe303767c56a64cdc94b124ce9538305787f225
-
SHA512
b9933ab35dcef02daea84b6fa20bc7d94ecfc7d4c8fdd9f3b3758fc29950540314f1ec93e189617250bae39eb76d293b51eee02fed48adc878909d22c9d12c4e
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZyqfGHmai8NKs6+:c8y93KQjy7G55riF1cMo03k4QHVKy
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1016-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/1016-1-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2448 1016 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1016 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3040 wrote to memory of 1016 3040 rundll32.exe 83 PID 3040 wrote to memory of 1016 3040 rundll32.exe 83 PID 3040 wrote to memory of 1016 3040 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dc9c7025edaccbc2ad709d485fe303767c56a64cdc94b124ce9538305787f225.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dc9c7025edaccbc2ad709d485fe303767c56a64cdc94b124ce9538305787f225.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 7163⤵
- Program crash
PID:2448
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 1016 -ip 10161⤵PID:2780