Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
02/03/2025, 22:08
Static task
static1
Behavioral task
behavioral1
Sample
3c04a7b759f0cd4e867fae287ccd003abdf719f57fabfdb304a1e6baf3209121.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3c04a7b759f0cd4e867fae287ccd003abdf719f57fabfdb304a1e6baf3209121.dll
Resource
win10v2004-20250217-en
General
-
Target
3c04a7b759f0cd4e867fae287ccd003abdf719f57fabfdb304a1e6baf3209121.dll
-
Size
137KB
-
MD5
34074195597501d855462ef005ac2cc8
-
SHA1
059275c5e87bb9f86809eee7b362ace555691b7d
-
SHA256
3c04a7b759f0cd4e867fae287ccd003abdf719f57fabfdb304a1e6baf3209121
-
SHA512
2f1c60152c9c245a2a95dbad8706258de746f541c6015b3a84ac647b8255f138e4369f10e1f2d09d8ee6d9ae23667b94ffb59bf728a9f61f5d72edee42af4bc6
-
SSDEEP
3072:2R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuu:z25GgFny61mraY
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\com\comb.dll rundll32.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\AppPatch\ComBack.Dll rundll32.exe File created C:\Windows\AppPatch\ComBack.Dll rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1704 2600 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1492 wrote to memory of 2600 1492 rundll32.exe 29 PID 1492 wrote to memory of 2600 1492 rundll32.exe 29 PID 1492 wrote to memory of 2600 1492 rundll32.exe 29 PID 1492 wrote to memory of 2600 1492 rundll32.exe 29 PID 1492 wrote to memory of 2600 1492 rundll32.exe 29 PID 1492 wrote to memory of 2600 1492 rundll32.exe 29 PID 1492 wrote to memory of 2600 1492 rundll32.exe 29 PID 2600 wrote to memory of 1704 2600 rundll32.exe 30 PID 2600 wrote to memory of 1704 2600 rundll32.exe 30 PID 2600 wrote to memory of 1704 2600 rundll32.exe 30 PID 2600 wrote to memory of 1704 2600 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3c04a7b759f0cd4e867fae287ccd003abdf719f57fabfdb304a1e6baf3209121.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3c04a7b759f0cd4e867fae287ccd003abdf719f57fabfdb304a1e6baf3209121.dll,#12⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 2363⤵
- Program crash
PID:1704
-
-