Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 09:46
Static task
static1
Behavioral task
behavioral1
Sample
e15fd8e2cc18f0c2c937f113555b4cec.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e15fd8e2cc18f0c2c937f113555b4cec.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ktvrqkp.dll
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ktvrqkp.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsisunz.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsisunz.dll
Resource
win10v2004-20231215-en
General
-
Target
$PLUGINSDIR/ktvrqkp.dll
-
Size
158KB
-
MD5
3c169ae0cc799f03fad14ebcc05f3d96
-
SHA1
ec4839ee8458429f57749f245045fc1deb30d832
-
SHA256
82bb5429daf7e9b364670303176370ed5d85e375ec249c6457655dbb1fd9dfc0
-
SHA512
4a9e97dafa1f6a0df9c79496769a19a124360111d95d503ba519c4e960c000ad69d284b5bc2001f4c51e4b9d2ce50ec20981533b984bf7562c7cacf79d8c7ab9
-
SSDEEP
3072:Bhp/L6MadCMGlNPm61Fu5xLGH2+Lw5H8Q52OFNz:BhBDl9mVxk2IP3OFN
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 300 2184 WerFault.exe 29 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2184 2192 rundll32.exe 29 PID 2192 wrote to memory of 2184 2192 rundll32.exe 29 PID 2192 wrote to memory of 2184 2192 rundll32.exe 29 PID 2192 wrote to memory of 2184 2192 rundll32.exe 29 PID 2192 wrote to memory of 2184 2192 rundll32.exe 29 PID 2192 wrote to memory of 2184 2192 rundll32.exe 29 PID 2192 wrote to memory of 2184 2192 rundll32.exe 29 PID 2184 wrote to memory of 300 2184 rundll32.exe 30 PID 2184 wrote to memory of 300 2184 rundll32.exe 30 PID 2184 wrote to memory of 300 2184 rundll32.exe 30 PID 2184 wrote to memory of 300 2184 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\ktvrqkp.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\ktvrqkp.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2184 -s 2203⤵
- Program crash
PID:300
-
-