Overview
overview
5Static
static
3SteamSetup.exe
windows10-1703-x64
4$PLUGINSDI...ls.dll
windows10-1703-x64
3$PLUGINSDI...em.dll
windows10-1703-x64
3$PLUGINSDI...gs.dll
windows10-1703-x64
3$PLUGINSDI...ec.dll
windows10-1703-x64
3$PLUGINSDI...ss.dll
windows10-1703-x64
3Steam.exe
windows10-1703-x64
5bin/SteamService.exe
windows10-1703-x64
1uninstall.exe
windows10-1703-x64
4$PLUGINSDI...LL.dll
windows10-1703-x64
3$PLUGINSDI...nk.dll
windows10-1703-x64
3$PLUGINSDI...ec.dll
windows10-1703-x64
3Analysis
-
max time kernel
315s -
max time network
1607s -
platform
windows10-1703_x64 -
resource
win10-20240214-en -
resource tags
arch:x64arch:x86image:win10-20240214-enlocale:en-usos:windows10-1703-x64system -
submitted
10-03-2024 22:24
Static task
static1
Behavioral task
behavioral1
Sample
SteamSetup.exe
Resource
win10-20240214-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10-20240221-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win10-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10-20240221-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10-20240221-en
Behavioral task
behavioral7
Sample
Steam.exe
Resource
win10-20240214-en
Behavioral task
behavioral8
Sample
bin/SteamService.exe
Resource
win10-20240221-en
Behavioral task
behavioral9
Sample
uninstall.exe
Resource
win10-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10-20240214-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/ShellLink.dll
Resource
win10-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10-20240221-en
General
-
Target
$PLUGINSDIR/LangDLL.dll
-
Size
5KB
-
MD5
0c44f21d4afc81cc99fac7cc35e4503a
-
SHA1
3d0d5c684df99a46510c0e2c0020163a9d11c08d
-
SHA256
8dc2be6679497994e3ddc97bc7bc1ce2b3c17ef3528b03ded6696ef198a11d10
-
SHA512
4e4bd35d6aa21cecbfe7a93a2ee7db8ee78ca710a4193dfe240d1067afbe10f61db332c1c85f6cc3ba404d895a959742401b615ef8ff5bd9028254c4a43a0923
-
SSDEEP
48:S46+/N3TKYKxbWsptIpBtWZ0iV8jAWiAJCvxft2O2B8mCofjLl:zPuPbOBtWZBV8jAWiAJCdv2CmpL
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 380 1044 WerFault.exe 74 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 96 wrote to memory of 1044 96 rundll32.exe 74 PID 96 wrote to memory of 1044 96 rundll32.exe 74 PID 96 wrote to memory of 1044 96 rundll32.exe 74
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\LangDLL.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:96 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\LangDLL.dll,#12⤵PID:1044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1044 -s 6163⤵
- Program crash
PID:380
-
-