Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
07-02-2025 23:28
Behavioral task
behavioral1
Sample
8b15b54f6a989e7ddd49cde8f4571c1e01a5555d04c7b897ede26f60af13335a.dll
Resource
win7-20241010-en
5 signatures
120 seconds
General
-
Target
8b15b54f6a989e7ddd49cde8f4571c1e01a5555d04c7b897ede26f60af13335a.dll
-
Size
76KB
-
MD5
4ceca6fe52731a0fafc7d907373b70de
-
SHA1
6362b3cd519a683005b392edc734d7c793895302
-
SHA256
8b15b54f6a989e7ddd49cde8f4571c1e01a5555d04c7b897ede26f60af13335a
-
SHA512
9b8b62bf08581b059bd2cd82d71009c36a1cfc01c9795bc8ee114a1e8c5129bbcc5e76617e95234a343541bcdfe5c0239c11ea5386f6ddb0ca19e4d3fc6c4878
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZUNACpV:c8y93KQjy7G55riF1cMo03GfpV
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/928-2-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/928-1-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/928-4-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2568 928 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 928 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2264 wrote to memory of 928 2264 rundll32.exe 29 PID 2264 wrote to memory of 928 2264 rundll32.exe 29 PID 2264 wrote to memory of 928 2264 rundll32.exe 29 PID 2264 wrote to memory of 928 2264 rundll32.exe 29 PID 2264 wrote to memory of 928 2264 rundll32.exe 29 PID 2264 wrote to memory of 928 2264 rundll32.exe 29 PID 2264 wrote to memory of 928 2264 rundll32.exe 29 PID 928 wrote to memory of 2568 928 rundll32.exe 30 PID 928 wrote to memory of 2568 928 rundll32.exe 30 PID 928 wrote to memory of 2568 928 rundll32.exe 30 PID 928 wrote to memory of 2568 928 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8b15b54f6a989e7ddd49cde8f4571c1e01a5555d04c7b897ede26f60af13335a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8b15b54f6a989e7ddd49cde8f4571c1e01a5555d04c7b897ede26f60af13335a.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 928 -s 3323⤵
- Program crash
PID:2568
-
-