Overview
overview
7Static
static
3windirstat...up.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$_5_.exe
windows10-2004-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows10-2004-x64
3shfolder.dll
windows10-2004-x64
1wdsh0407.chm
windows10-2004-x64
1wdsh040e.chm
windows10-2004-x64
1wdsh0415.chm
windows10-2004-x64
1wdsr0405.dll
windows10-2004-x64
1wdsr0407.dll
windows10-2004-x64
1wdsr040a.dll
windows10-2004-x64
1wdsr040b.dll
windows10-2004-x64
1wdsr040c.dll
windows10-2004-x64
1wdsr040e.dll
windows10-2004-x64
1wdsr0410.dll
windows10-2004-x64
1wdsr0413.dll
windows10-2004-x64
1wdsr0415.dll
windows10-2004-x64
1wdsr0419.dll
windows10-2004-x64
1wdsr0425.dll
windows10-2004-x64
1windirstat.chm
windows10-2004-x64
1windirstat.exe
windows10-2004-x64
7Analysis
-
max time kernel
434s -
max time network
439s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18-03-2024 19:25
Static task
static1
Behavioral task
behavioral1
Sample
windirstat1_1_2_setup.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
$_5_.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Uninstall.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
shfolder.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral8
Sample
wdsh0407.chm
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
wdsh040e.chm
Resource
win10v2004-20240226-en
Behavioral task
behavioral10
Sample
wdsh0415.chm
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
wdsr0405.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral12
Sample
wdsr0407.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
wdsr040a.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral14
Sample
wdsr040b.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
wdsr040c.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral16
Sample
wdsr040e.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
wdsr0410.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral18
Sample
wdsr0413.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
wdsr0415.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral20
Sample
wdsr0419.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
wdsr0425.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral22
Sample
windirstat.chm
Resource
win10v2004-20231215-en
General
-
Target
$PLUGINSDIR/System.dll
-
Size
10KB
-
MD5
4125926391466fdbe8a4730f2374b033
-
SHA1
fdd23034ada72d2537939ac6755d7f7c0e9b3f0e
-
SHA256
6692bd93bcd04146831652780c1170da79aa3784c3c070d95fb1580e339de6c5
-
SHA512
32a1cf96842454b3c3641316ee39051ae024bdce9e88ac236eadad531f2c0a08d46b77d525f7d994c9a5af4cc9a391d30ee92b9ec782b7fb9a42c76f0f52a008
-
SSDEEP
192:4O6dJA/ruAFEiUdWWE6hE5RYUdJfbub1algMO:RKAFERdlxhGRYUzqZal
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4524 3664 WerFault.exe rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid process Token: SeManageVolumePrivilege 4844 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4356 wrote to memory of 3664 4356 rundll32.exe rundll32.exe PID 4356 wrote to memory of 3664 4356 rundll32.exe rundll32.exe PID 4356 wrote to memory of 3664 4356 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#12⤵PID:3664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3664 -s 6123⤵
- Program crash
PID:4524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3664 -ip 36641⤵PID:4688
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:1176
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4844
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4844-0-0x000001B712C40000-0x000001B712C50000-memory.dmpFilesize
64KB
-
memory/4844-16-0x000001B712D40000-0x000001B712D50000-memory.dmpFilesize
64KB
-
memory/4844-32-0x000001B71B040000-0x000001B71B041000-memory.dmpFilesize
4KB
-
memory/4844-34-0x000001B71B070000-0x000001B71B071000-memory.dmpFilesize
4KB
-
memory/4844-35-0x000001B71B070000-0x000001B71B071000-memory.dmpFilesize
4KB
-
memory/4844-36-0x000001B71B180000-0x000001B71B181000-memory.dmpFilesize
4KB