Analysis
-
max time kernel
95s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
05-02-2025 01:18
Behavioral task
behavioral1
Sample
8842766921a262ea7fd02b1a7ae6a6cec31ce3b8b3e3eed6eb0d9f1972ccecc0.dll
Resource
win7-20240708-en
6 signatures
150 seconds
General
-
Target
8842766921a262ea7fd02b1a7ae6a6cec31ce3b8b3e3eed6eb0d9f1972ccecc0.dll
-
Size
76KB
-
MD5
56fd3b6dd3ebebca04110e84e45e019f
-
SHA1
98c797270ce8ae22e3914ab65ef07be697ee71f0
-
SHA256
8842766921a262ea7fd02b1a7ae6a6cec31ce3b8b3e3eed6eb0d9f1972ccecc0
-
SHA512
48ef7394637d88f24566d377e74b46f9cb990e3888db643e06aef05d77ef0d7cc48439f8f0274add4e476af26db34432c6faf15fe49979382d5070ae7b355437
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZiGCD2TF7Rq9coC:c8y93KQjy7G55riF1cMo038hD2TF7RqO
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2224-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/2224-1-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3752 2224 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2224 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1464 wrote to memory of 2224 1464 rundll32.exe 83 PID 1464 wrote to memory of 2224 1464 rundll32.exe 83 PID 1464 wrote to memory of 2224 1464 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8842766921a262ea7fd02b1a7ae6a6cec31ce3b8b3e3eed6eb0d9f1972ccecc0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8842766921a262ea7fd02b1a7ae6a6cec31ce3b8b3e3eed6eb0d9f1972ccecc0.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2224 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2224 -s 7163⤵
- Program crash
PID:3752
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2224 -ip 22241⤵PID:4764