Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/03/2025, 20:55
Static task
static1
Behavioral task
behavioral1
Sample
21dc4187a7b5a5fda2a5f73101c27a4cd4dcc65566b1ff7327863f4e91211abd.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
21dc4187a7b5a5fda2a5f73101c27a4cd4dcc65566b1ff7327863f4e91211abd.dll
Resource
win10v2004-20250217-en
General
-
Target
21dc4187a7b5a5fda2a5f73101c27a4cd4dcc65566b1ff7327863f4e91211abd.dll
-
Size
137KB
-
MD5
a5a34d6d4a69354254a7749b25b48c50
-
SHA1
a69e7b69b2815d7f72000274f00ddd36515142e5
-
SHA256
21dc4187a7b5a5fda2a5f73101c27a4cd4dcc65566b1ff7327863f4e91211abd
-
SHA512
3ea06284b10766143a301f6ea7936ed37f46e35c7b4c16fa48e2422aef5ab06d7c9b166e495bb7c636b57b708816ba5dfb5acc462ef5c94c21ea646411dec2bd
-
SSDEEP
3072:cR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuQ:p25GgFny61mraW
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\com\comb.dll rundll32.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\AppPatch\ComBack.Dll rundll32.exe File created C:\Windows\AppPatch\ComBack.Dll rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2908 2904 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2036 wrote to memory of 2904 2036 rundll32.exe 31 PID 2036 wrote to memory of 2904 2036 rundll32.exe 31 PID 2036 wrote to memory of 2904 2036 rundll32.exe 31 PID 2036 wrote to memory of 2904 2036 rundll32.exe 31 PID 2036 wrote to memory of 2904 2036 rundll32.exe 31 PID 2036 wrote to memory of 2904 2036 rundll32.exe 31 PID 2036 wrote to memory of 2904 2036 rundll32.exe 31 PID 2904 wrote to memory of 2908 2904 rundll32.exe 32 PID 2904 wrote to memory of 2908 2904 rundll32.exe 32 PID 2904 wrote to memory of 2908 2904 rundll32.exe 32 PID 2904 wrote to memory of 2908 2904 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\21dc4187a7b5a5fda2a5f73101c27a4cd4dcc65566b1ff7327863f4e91211abd.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\21dc4187a7b5a5fda2a5f73101c27a4cd4dcc65566b1ff7327863f4e91211abd.dll,#12⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 2283⤵
- Program crash
PID:2908
-
-