Analysis
-
max time kernel
102s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
05/04/2025, 06:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2025 Proposal - AI Series Docs.exe
Resource
win10v2004-20250314-en
15 signatures
150 seconds
Behavioral task
behavioral2
Sample
oledlg.dll
Resource
win10v2004-20250314-en
3 signatures
150 seconds
General
-
Target
oledlg.dll
-
Size
82.2MB
-
MD5
293af7be4364bcc7086eb7d69a32a02d
-
SHA1
fe0ef6cf1c053b4b4de4ba1ed1536a1f7d88074f
-
SHA256
a26a65ffb73eb8ffe3a809e2768c9c9da4838581463b09ba38c19ef9950e7e84
-
SHA512
7e870a549580a96ae213d43439216cea5bf58c244eaeba7e8161771220f8ad17560b7aaeac8b00d41f76ac12c9df23aa61eaaab138db4a9e078135cdfb0051da
-
SSDEEP
1572864:lvEfH6aannL/Ms/P97+IN2rn26sLBqaxsoJtW5hcpD3jgx0NiX:1EgnVl1DDkfX
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 6104 4004 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5436 wrote to memory of 4004 5436 rundll32.exe 86 PID 5436 wrote to memory of 4004 5436 rundll32.exe 86 PID 5436 wrote to memory of 4004 5436 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\oledlg.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5436 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\oledlg.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4004 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4004 -s 6683⤵
- Program crash
PID:6104
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4004 -ip 40041⤵PID:3144