Overview
overview
8Static
static
3DLL/MegaDLL.dll
windows7-x64
1DLL/MegaDLL.dll
windows10-2004-x64
1DLL/RollMQTT.dll
windows7-x64
8DLL/RollMQTT.dll
windows10-2004-x64
8DLL/updater.exe
windows7-x64
1DLL/updater.exe
windows10-2004-x64
1MegaMaker.exe
windows7-x64
1MegaMaker.exe
windows10-2004-x64
6Shortcut to Gifs.lnk
windows7-x64
3Shortcut to Gifs.lnk
windows10-2004-x64
3Shortcut t...ls.lnk
windows7-x64
3Shortcut t...ls.lnk
windows10-2004-x64
3buffer_zlib.dll
windows7-x64
1buffer_zlib.dll
windows10-2004-x64
1gme.dll
windows7-x64
1gme.dll
windows10-2004-x64
1rousrDissonance.dll
windows7-x64
1rousrDissonance.dll
windows10-2004-x64
3Analysis
-
max time kernel
1561s -
max time network
1568s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10-10-2023 10:38
Static task
static1
Behavioral task
behavioral1
Sample
DLL/MegaDLL.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
DLL/MegaDLL.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
DLL/RollMQTT.dll
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
DLL/RollMQTT.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
DLL/updater.exe
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
DLL/updater.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
MegaMaker.exe
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
MegaMaker.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
Shortcut to Gifs.lnk
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
Shortcut to Gifs.lnk
Resource
win10v2004-20230915-en
Behavioral task
behavioral11
Sample
Shortcut to Levels.lnk
Resource
win7-20230831-en
Behavioral task
behavioral12
Sample
Shortcut to Levels.lnk
Resource
win10v2004-20230915-en
Behavioral task
behavioral13
Sample
buffer_zlib.dll
Resource
win7-20230831-en
Behavioral task
behavioral14
Sample
buffer_zlib.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral15
Sample
gme.dll
Resource
win7-20230831-en
Behavioral task
behavioral16
Sample
gme.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral17
Sample
rousrDissonance.dll
Resource
win7-20230831-en
Behavioral task
behavioral18
Sample
rousrDissonance.dll
Resource
win10v2004-20230915-en
General
-
Target
rousrDissonance.dll
-
Size
319KB
-
MD5
49069a0ab0892d2a4b1f5ff114571b5c
-
SHA1
f75c3ef3b3da8fe182307ebf650bf0aa05678429
-
SHA256
02224a4afa548de7b409d515dc4e9e7c5a60653f432639c568140a05cf84f045
-
SHA512
557f6e2fff9b11bbf5e3508fbd871b8d4d14a619e11b17738c414903412ec80d6b7f74f80a3d80cbff7956fbe0f83453f03d49edb1550d35a6754638a33c5cb1
-
SSDEEP
6144:nf5qHW95s2TtMMAvqaBPsku69/Y16iBRe1KLJ2r1Y0bw5aU0eTVza5q/+uPGhIJC:jMMAvqaBPst6e16XULy1Y0Dela5qzO2Q
Malware Config
Signatures
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\discord-\DefaultIcon rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\discord-\shell\open\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\discord-\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\discord-\shell\open rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\discord-\shell\open\command\ = "C:\\Windows\\SysWOW64\\rundll32.exe" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\discord- rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\discord-\ = "URL:Run game protocol" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\discord-\URL Protocol rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\discord-\DefaultIcon\ = "C:\\Windows\\SysWOW64\\rundll32.exe" rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1384 wrote to memory of 1488 1384 rundll32.exe 28 PID 1384 wrote to memory of 1488 1384 rundll32.exe 28 PID 1384 wrote to memory of 1488 1384 rundll32.exe 28 PID 1384 wrote to memory of 1488 1384 rundll32.exe 28 PID 1384 wrote to memory of 1488 1384 rundll32.exe 28 PID 1384 wrote to memory of 1488 1384 rundll32.exe 28 PID 1384 wrote to memory of 1488 1384 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\rousrDissonance.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\rousrDissonance.dll,#12⤵
- Modifies registry class
PID:1488
-