Overview
overview
8Static
static
3winamp_lat...ll.exe
windows7-x64
8winamp_lat...ll.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...ch.dll
windows7-x64
3$PLUGINSDI...ch.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...os.dll
windows7-x64
3$PLUGINSDI...os.dll
windows10-2004-x64
3$PLUGINSDI...ip.dll
windows7-x64
3$PLUGINSDI...ip.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...mp.dll
windows7-x64
3$PLUGINSDI...mp.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3Components/ssdp.dll
windows7-x64
1Components/ssdp.dll
windows10-2004-x64
1Elevator.exe
windows7-x64
1Elevator.exe
windows10-2004-x64
1Microsoft....40.dll
windows7-x64
3Microsoft....40.dll
windows10-2004-x64
3Microsoft....40.dll
windows7-x64
3Microsoft....40.dll
windows10-2004-x64
3Analysis
-
max time kernel
1690s -
max time network
1168s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25-03-2024 16:22
Static task
static1
Behavioral task
behavioral1
Sample
winamp_latest_full.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
winamp_latest_full.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Dialer.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Dialer.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/ShellDispatch.dll
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/ShellDispatch.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/execDos.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/execDos.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/extstrip.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/extstrip.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/nsis_winamp.dll
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/nsis_winamp.dll
Resource
win10v2004-20240319-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/nsisdl.dll
Resource
win7-20240220-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/nsisdl.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
Components/ssdp.dll
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
Components/ssdp.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
Elevator.exe
Resource
win7-20240215-en
Behavioral task
behavioral28
Sample
Elevator.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
Microsoft.VC142.CRT/concrt140.dll
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
Microsoft.VC142.CRT/concrt140.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
Microsoft.VC142.CRT/msvcp140.dll
Resource
win7-20231129-en
Behavioral task
behavioral32
Sample
Microsoft.VC142.CRT/msvcp140.dll
Resource
win10v2004-20231215-en
General
-
Target
Microsoft.VC142.CRT/concrt140.dll
-
Size
237KB
-
MD5
9ad549c121108b3b1408a30bee325d08
-
SHA1
898ffc728087861e619dababd8e65cc902276d06
-
SHA256
263975e4f5afc90e91f9f601080b92c9fbc5e471132f63ad01c6c4f99b33b83a
-
SHA512
9a9005acf2af86d6a0a95773e968d98e90b7e71e8e71d58949ff51aad49050dca57d94a19671b1b5026bd74e7b627f31d0c8a50bb66ab740d629022c3a95d579
-
SSDEEP
6144:aLy1UNAZHA2nSG5LbEcutDsSaqiOHYb836TLLOeHFQyS9uLms12z/NpJ9yne:2hkH0Yb83KLxmuLmdzoe
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3200 3532 WerFault.exe rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid process Token: SeManageVolumePrivilege 4684 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1116 wrote to memory of 3532 1116 rundll32.exe rundll32.exe PID 1116 wrote to memory of 3532 1116 rundll32.exe rundll32.exe PID 1116 wrote to memory of 3532 1116 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Microsoft.VC142.CRT\concrt140.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Microsoft.VC142.CRT\concrt140.dll,#12⤵PID:3532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3532 -s 6043⤵
- Program crash
PID:3200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3532 -ip 35321⤵PID:116
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:3840
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4684