Analysis
-
max time kernel
101s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
05-02-2025 11:00
Behavioral task
behavioral1
Sample
1344a9b9c35034117d430b94bb48bb2006778c9d5ebf24e4bc1a2e80b995bd6fN.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1344a9b9c35034117d430b94bb48bb2006778c9d5ebf24e4bc1a2e80b995bd6fN.dll
Resource
win10v2004-20250129-en
General
-
Target
1344a9b9c35034117d430b94bb48bb2006778c9d5ebf24e4bc1a2e80b995bd6fN.dll
-
Size
76KB
-
MD5
d779be4befab7809a507fb3be979a850
-
SHA1
a5b0e4cefad7f8bb15d261bfc061184f1f7065d1
-
SHA256
1344a9b9c35034117d430b94bb48bb2006778c9d5ebf24e4bc1a2e80b995bd6f
-
SHA512
c1457b106d9dbdd9e950cf5ffb97bef7fa5cd9536fb32d44aa3fdd44fceba3ebb0095346431b8cec4cabd4af3f0e1ff9fcbcf2224ee98bde014315316e30ae7f
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZOyYFZ:c8y93KQjy7G55riF1cMo03oyq
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
resource yara_rule behavioral2/memory/4124-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/4124-2-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3572 4124 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4124 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 544 wrote to memory of 4124 544 rundll32.exe 83 PID 544 wrote to memory of 4124 544 rundll32.exe 83 PID 544 wrote to memory of 4124 544 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1344a9b9c35034117d430b94bb48bb2006778c9d5ebf24e4bc1a2e80b995bd6fN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1344a9b9c35034117d430b94bb48bb2006778c9d5ebf24e4bc1a2e80b995bd6fN.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4124 -s 7003⤵
- Program crash
PID:3572
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4124 -ip 41241⤵PID:2736