Overview
overview
7Static
static
3a2110230c9...11.exe
windows7-x64
7a2110230c9...11.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7_controls.dll
windows7-x64
3_controls.dll
windows10-2004-x64
3_core.dll
windows7-x64
3_core.dll
windows10-2004-x64
3_gdi.dll
windows7-x64
3_gdi.dll
windows10-2004-x64
3_html.dll
windows7-x64
3_html.dll
windows10-2004-x64
3_misc.dll
windows7-x64
3_misc.dll
windows10-2004-x64
3_sre.dll
windows7-x64
3_sre.dll
windows10-2004-x64
3_ssl.dll
windows7-x64
3_ssl.dll
windows10-2004-x64
3_windows.dll
windows7-x64
3_windows.dll
windows10-2004-x64
3_winreg.dll
windows7-x64
3_winreg.dll
windows10-2004-x64
3abc.exe
windows7-x64
1abc.exe
windows10-2004-x64
1datetime.dll
windows7-x64
3datetime.dll
windows10-2004-x64
3BitTornado...er.pyc
windows7-x64
3BitTornado...er.pyc
windows10-2004-x64
3BitTornado...er.pyc
windows7-x64
3BitTornado...er.pyc
windows10-2004-x64
3Analysis
-
max time kernel
92s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 14:21
Static task
static1
Behavioral task
behavioral1
Sample
a2110230c988afbb0fd2fcd61e080f11.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a2110230c988afbb0fd2fcd61e080f11.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
Uninstall.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Uninstall.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral7
Sample
_controls.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
_controls.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral9
Sample
_core.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
_core.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral11
Sample
_gdi.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
_gdi.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral13
Sample
_html.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
_html.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral15
Sample
_misc.dll
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
_misc.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral17
Sample
_sre.dll
Resource
win7-20240215-en
Behavioral task
behavioral18
Sample
_sre.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral19
Sample
_ssl.dll
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
_ssl.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral21
Sample
_windows.dll
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
_windows.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral23
Sample
_winreg.dll
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
_winreg.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral25
Sample
abc.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
abc.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral27
Sample
datetime.dll
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
datetime.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral29
Sample
BitTornado/BT1/Choker.pyc
Resource
win7-20240215-en
Behavioral task
behavioral30
Sample
BitTornado/BT1/Choker.pyc
Resource
win10v2004-20240221-en
Behavioral task
behavioral31
Sample
BitTornado/BT1/Connecter.pyc
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
BitTornado/BT1/Connecter.pyc
Resource
win10v2004-20240221-en
General
-
Target
$PLUGINSDIR/System.dll
-
Size
9KB
-
MD5
417877a5d5f1e8e543b4585faa1141ec
-
SHA1
d4b3cc3dc987e9c421a280dc9f67e3bf1afdaf51
-
SHA256
24d96a8b14257ede93df3e1533c6b8b1c370696c0815dc450c872ce80184462a
-
SHA512
63d516c8258659c0a236fbf1725140cbd51ffa09b19794de145b10347c4e8e670d99f09978f36961e154fd2ee7c288c102bbb05ab9c898c740865515f6e769bd
-
SSDEEP
192:BEnGTkzww33gFsh1wrlI5/YAZ42F+0hCyhvvr:a3+sheRa/YQDFoqvv
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 532 1096 WerFault.exe 85 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4968 wrote to memory of 1096 4968 rundll32.exe 85 PID 4968 wrote to memory of 1096 4968 rundll32.exe 85 PID 4968 wrote to memory of 1096 4968 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#12⤵PID:1096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1096 -s 6123⤵
- Program crash
PID:532
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1096 -ip 10961⤵PID:3804