Overview
overview
7Static
static
38e0963e054...0d.exe
windows7-x64
78e0963e054...0d.exe
windows10-2004-x64
7$PLUGINSDIR/BDDL.dll
windows7-x64
1$PLUGINSDIR/BDDL.dll
windows10-2004-x64
1$PLUGINSDI...ls.dll
windows7-x64
1$PLUGINSDI...ls.dll
windows10-2004-x64
1$PLUGINSDI...in.dll
windows7-x64
3$PLUGINSDI...in.dll
windows10-2004-x64
3$PLUGINSDIR/dl.dll
windows7-x64
1$PLUGINSDIR/dl.dll
windows10-2004-x64
1$PLUGINSDI...ro.dll
windows7-x64
3$PLUGINSDI...ro.dll
windows10-2004-x64
3Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
04-02-2024 02:53
Static task
static1
Behavioral task
behavioral1
Sample
8e0963e05443e34b41d580af4c18230d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8e0963e05443e34b41d580af4c18230d.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/BDDL.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/BDDL.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/BDLogicUtils.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/BDLogicUtils.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/BDMSkin.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/BDMSkin.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/dl.dll
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/dl.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/tmp6x7zro.dll
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/tmp6x7zro.dll
Resource
win10v2004-20231222-en
General
-
Target
$PLUGINSDIR/tmp6x7zro.dll
-
Size
644KB
-
MD5
fa74c2c0fd23d41d34c062805047ee39
-
SHA1
678c20736ade6dcc1cc616505029f6c21c1a8695
-
SHA256
49e3b0944dfcf3426c8b3df1b889c7c90218082481957c29f29551589a839e6d
-
SHA512
0014ad7f9f880b14c2a4593bac4e6b5435be93d99a7a0c191c2b3894a309575d6bb0ead765cb8b7646d43ac5479cb06d491b75a35505da18d822521ddd280a0f
-
SSDEEP
6144:vCwxvbKFxY1VqjP9BRsJMi/748Wvd1y95V19hd3VDiqqlfUR2obvQfG1NMXCqzgj:KwxvbkK1ojPDol5odX9no6kMyA9Wqfc
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1460 3848 WerFault.exe 87 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4080 wrote to memory of 3848 4080 rundll32.exe 87 PID 4080 wrote to memory of 3848 4080 rundll32.exe 87 PID 4080 wrote to memory of 3848 4080 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\tmp6x7zro.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\tmp6x7zro.dll,#12⤵PID:3848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3848 -s 6883⤵
- Program crash
PID:1460
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3848 -ip 38481⤵PID:4436