Analysis
-
max time kernel
81s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-02-2023 22:08
Behavioral task
behavioral1
Sample
Game.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Game.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
System/RGSS301.dll
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
System/RGSS301.dll
Resource
win10v2004-20220812-en
General
-
Target
System/RGSS301.dll
-
Size
1.0MB
-
MD5
dd25855ac39d32da033902fc58fa210b
-
SHA1
0ffa23a4d0b81438a329258f5c8d3b3403f4aa94
-
SHA256
27647690ed16218cd988dd71069fdca67207515b2a2df775be361f0198ab6876
-
SHA512
07f7f7cb4eda2165b4b28456fb01d4edea6e3d5f305dde19256865777905a0d0bb1d13ce1194a8639d740f633ccf1507a1b87530644d5e2d512a86829195ae60
-
SSDEEP
24576:+pc8WbPqpzFwdPhet279ae3P7zqP2JzCNkX67Flr1nH0F3ia:+pc8W7qEdPhet2hae3HfJR2Uf
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4720 4360 WerFault.exe rundll32.exe -
Modifies registry class 3 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4620 wrote to memory of 4360 4620 rundll32.exe rundll32.exe PID 4620 wrote to memory of 4360 4620 rundll32.exe rundll32.exe PID 4620 wrote to memory of 4360 4620 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\System\RGSS301.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\System\RGSS301.dll,#12⤵
- Modifies registry class
PID:4360 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4360 -s 7123⤵
- Program crash
PID:4720
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4360 -ip 43601⤵PID:5016