Overview
overview
10Static
static
5Setup.exe
windows7-x64
10Setup.exe
windows10-2004-x64
10cracked dl...ib.dll
windows7-x64
1cracked dl...ib.dll
windows10-2004-x64
3dll data/BRD.dll
windows7-x64
5dll data/BRD.dll
windows10-2004-x64
5dll data/D...es.dll
windows7-x64
5dll data/D...es.dll
windows10-2004-x64
5resources/PIM.dll
windows7-x64
3resources/PIM.dll
windows10-2004-x64
3resources/...ry.dll
windows7-x64
3resources/...ry.dll
windows10-2004-x64
3Analysis
-
max time kernel
2s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
24-10-2022 07:52
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
cracked dll/amtlib.dll
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
cracked dll/amtlib.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
dll data/BRD.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
dll data/BRD.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
dll data/DTCommonRes.dll
Resource
win7-20220901-en
Behavioral task
behavioral8
Sample
dll data/DTCommonRes.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
resources/PIM.dll
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
resources/PIM.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
resources/updaterinventory.dll
Resource
win7-20220901-en
Behavioral task
behavioral12
Sample
resources/updaterinventory.dll
Resource
win10v2004-20220812-en
General
-
Target
dll data/DTCommonRes.dll
-
Size
5.5MB
-
MD5
5db21e39400f807d2ae7047c57dd0cec
-
SHA1
9e65377522c06482b376e8c17be5822b357c5bb5
-
SHA256
6b216cbf7e4d01d49e3ccb2b48aa7758cbecef064dbff1ecbff2e674bbb6208a
-
SHA512
3e5fc38ae87baed136f41fa652494975a0cee1caf3a818927515e346015dbcbf2128ba58bb2a8484019398d5796fc66691e48f8268a7a6dae14224e2f85edf95
-
SSDEEP
98304:N7bmxVSpxCE6SGAUw8xuikmi0Xso9Gbmv43HI+uFFFdaFFFd1CuU4202Lh2Eb22z:VbmxVwYkWCbmv4Y+uFFFsFFFOuU4202j
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
rundll32.exepid process 1700 rundll32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1268 1700 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1368 wrote to memory of 1700 1368 rundll32.exe rundll32.exe PID 1368 wrote to memory of 1700 1368 rundll32.exe rundll32.exe PID 1368 wrote to memory of 1700 1368 rundll32.exe rundll32.exe PID 1368 wrote to memory of 1700 1368 rundll32.exe rundll32.exe PID 1368 wrote to memory of 1700 1368 rundll32.exe rundll32.exe PID 1368 wrote to memory of 1700 1368 rundll32.exe rundll32.exe PID 1368 wrote to memory of 1700 1368 rundll32.exe rundll32.exe PID 1700 wrote to memory of 1268 1700 rundll32.exe WerFault.exe PID 1700 wrote to memory of 1268 1700 rundll32.exe WerFault.exe PID 1700 wrote to memory of 1268 1700 rundll32.exe WerFault.exe PID 1700 wrote to memory of 1268 1700 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\dll data\DTCommonRes.dll",#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\dll data\DTCommonRes.dll",#12⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1700 -s 2603⤵
- Program crash
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1268-56-0x0000000000000000-mapping.dmp
-
memory/1700-54-0x0000000000000000-mapping.dmp
-
memory/1700-55-0x0000000074E41000-0x0000000074E43000-memory.dmpFilesize
8KB
-
memory/1700-57-0x00000000740B0000-0x0000000074637000-memory.dmpFilesize
5.5MB
-
memory/1700-58-0x0000000073B20000-0x00000000740A7000-memory.dmpFilesize
5.5MB
-
memory/1700-59-0x00000000740B0000-0x0000000074637000-memory.dmpFilesize
5.5MB
-
memory/1700-60-0x0000000010000000-0x000000001002E000-memory.dmpFilesize
184KB