Overview
overview
10Static
static
3DOCU_95773...DF.exe
windows7-x64
10DOCU_95773...DF.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Azotemic/D...ds.vbs
windows7-x64
1Azotemic/D...ds.vbs
windows10-2004-x64
1Oppriorite...og.dll
windows7-x64
1Oppriorite...og.dll
windows10-2004-x64
1Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-01-2024 11:06
Static task
static1
Behavioral task
behavioral1
Sample
DOCU_957735271647895846_PDF.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
DOCU_957735271647895846_PDF.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Azotemic/Discontinuations/Lydkort/keywords.vbs
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Azotemic/Discontinuations/Lydkort/keywords.vbs
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
Opprioriter/Brugerinterface/Belbsfeltet/Algores/vtablog.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
Opprioriter/Brugerinterface/Belbsfeltet/Algores/vtablog.dll
Resource
win10v2004-20231215-en
General
-
Target
Opprioriter/Brugerinterface/Belbsfeltet/Algores/vtablog.dll
-
Size
268KB
-
MD5
35119e61479373ba5d7433f106556e79
-
SHA1
096a7d227eb2514d76ec5d10bfd1cf165d4a9177
-
SHA256
f21d9de02c67e51bb9f7163f676f2d4710b2befae04fd0751a63cf1278c48a3c
-
SHA512
21318d0924393c8269419df5acc0c07ca2f754fd9d9ad80d393cf7ebec1b16986d123f2775ae210383b7faa106ed84e829c949004a123da844c07f2b46387453
-
SSDEEP
3072:s1vaCg+eY9yp71driAAYBnk/+eeaQyJen3n83fucakiD88iryUBw:ovDgZYq/rzfNufuceD5UBw
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1944 wrote to memory of 3056 1944 rundll32.exe WerFault.exe PID 1944 wrote to memory of 3056 1944 rundll32.exe WerFault.exe PID 1944 wrote to memory of 3056 1944 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Opprioriter\Brugerinterface\Belbsfeltet\Algores\vtablog.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1944 -s 842⤵PID:3056
-