Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 04:09
Static task
static1
Behavioral task
behavioral1
Sample
987080eb9b427abf6963c965f0df5d14.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
987080eb9b427abf6963c965f0df5d14.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsisunz.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsisunz.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/ooi.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/ooi.dll
Resource
win10v2004-20231215-en
General
-
Target
$PLUGINSDIR/ooi.dll
-
Size
122KB
-
MD5
2690b36fa914f15c6532dbc1a4f1158d
-
SHA1
8f0d38bcb9081058c8c249b12994004f5115c70e
-
SHA256
70f39e836f56eee07099c64d28dda45cf3176eb808f38833b732fb5b5318accb
-
SHA512
d2092cfc876ff2fb0686b577a6ef82dca43ec3eb91c7547103f34bbc88b3fbe93c67a864f0501aa4f07b004c0493fda6822292247623bbc30de2a6ff9ecd00c0
-
SSDEEP
1536:LQUDghS9/Qa9AOhgbzfJfSZimf1Drj19c9TnTBTBZGLKPHSI:T+Sy37Y3R9c9h9ZgQHSI
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1976 1948 WerFault.exe 15 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2404 wrote to memory of 1948 2404 rundll32.exe 15 PID 2404 wrote to memory of 1948 2404 rundll32.exe 15 PID 2404 wrote to memory of 1948 2404 rundll32.exe 15 PID 2404 wrote to memory of 1948 2404 rundll32.exe 15 PID 2404 wrote to memory of 1948 2404 rundll32.exe 15 PID 2404 wrote to memory of 1948 2404 rundll32.exe 15 PID 2404 wrote to memory of 1948 2404 rundll32.exe 15 PID 1948 wrote to memory of 1976 1948 rundll32.exe 19 PID 1948 wrote to memory of 1976 1948 rundll32.exe 19 PID 1948 wrote to memory of 1976 1948 rundll32.exe 19 PID 1948 wrote to memory of 1976 1948 rundll32.exe 19
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\ooi.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1948 -s 2202⤵
- Program crash
PID:1976
-
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\ooi.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2404