Analysis
-
max time kernel
101s -
max time network
104s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
21/04/2025, 23:40
Behavioral task
behavioral1
Sample
faed3c4833e5efd047059d3bb55403d2b0de824432d0bda9b15773d192872f62.dll
Resource
win10v2004-20250314-en
4 signatures
150 seconds
General
-
Target
faed3c4833e5efd047059d3bb55403d2b0de824432d0bda9b15773d192872f62.dll
-
Size
288KB
-
MD5
926cd53f4f0761ed7063f8da57b2cd31
-
SHA1
7248b238c53df20cefef90b7d9878980241da4c6
-
SHA256
faed3c4833e5efd047059d3bb55403d2b0de824432d0bda9b15773d192872f62
-
SHA512
5f8b5283f3d0068442b03cadf592e8c08820ad942605741e17c60be5ada53b3463322d132e497b43e025a85a440abc86eedcd34453d08ee9ca5ed9c7bf5689e1
-
SSDEEP
6144:OIWXeetwzIql58xzR2VFjr3pyU1v5x/y1tSCh6hjBx0eD:lxetwzIql58xzR2VFjr3p1R5x/4rhyHF
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4136-9-0x0000000002CE0000-0x0000000002CEB000-memory.dmp upx behavioral2/memory/4136-10-0x0000000002CE0000-0x0000000002CEB000-memory.dmp upx -
Program crash 2 IoCs
pid pid_target Process procid_target 6108 4136 WerFault.exe 78 5152 4136 WerFault.exe 78 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 236 wrote to memory of 4136 236 rundll32.exe 78 PID 236 wrote to memory of 4136 236 rundll32.exe 78 PID 236 wrote to memory of 4136 236 rundll32.exe 78
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\faed3c4833e5efd047059d3bb55403d2b0de824432d0bda9b15773d192872f62.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:236 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\faed3c4833e5efd047059d3bb55403d2b0de824432d0bda9b15773d192872f62.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4136 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 6403⤵
- Program crash
PID:6108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 4923⤵
- Program crash
PID:5152
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 4136 -ip 41361⤵PID:1548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4136 -ip 41361⤵PID:5372