Analysis

  • max time kernel
    147s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    28/03/2024, 22:46 UTC

General

  • Target

    Yagami 1.0/libstdc++-6.dll

  • Size

    1.5MB

  • MD5

    63b4f37587334014fda842a04b1baae4

  • SHA1

    86202ab04e3e69daacae4ea2612d5ea6f5f1b256

  • SHA256

    544d488fcfd76749c5ef2cd6bf9f73cc9fe59a86a819d369d710cca6e43cf4b1

  • SHA512

    f14c708789d64259ac37b9b631949dc29bd1d9e91bfeec1ef716ff13747893dec32c82d95d07a7ee629a9f554e059ccb2286a38d84366406ae4d536f5e318014

  • SSDEEP

    24576:qOV/j1A8xgh30C/xM866mm3DMy3Ly5E9B0v4Q:X/zx98J3AYLy5B

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe "C:\Users\Admin\AppData\Local\Temp\Yagami 1.0\libstdc++-6.dll",#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4256
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\Temp\Yagami 1.0\libstdc++-6.dll",#1
      2⤵
        PID:4248
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4248 -s 612
          3⤵
          • Program crash
          PID:2220
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 4248 -ip 4248
      1⤵
        PID:2704

      Network

      • flag-us
        DNS
        241.150.49.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        241.150.49.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        69.31.126.40.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        69.31.126.40.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        104.219.191.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        104.219.191.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        157.123.68.40.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        157.123.68.40.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        206.23.85.13.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        206.23.85.13.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        31.243.111.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        31.243.111.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        137.71.105.51.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        137.71.105.51.in-addr.arpa
        IN PTR
        Response
      • 20.231.121.79:80
        46 B
        1
      • 8.8.8.8:53
        241.150.49.20.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        241.150.49.20.in-addr.arpa

      • 8.8.8.8:53
        69.31.126.40.in-addr.arpa
        dns
        71 B
        157 B
        1
        1

        DNS Request

        69.31.126.40.in-addr.arpa

      • 8.8.8.8:53
        104.219.191.52.in-addr.arpa
        dns
        73 B
        147 B
        1
        1

        DNS Request

        104.219.191.52.in-addr.arpa

      • 8.8.8.8:53
        157.123.68.40.in-addr.arpa
        dns
        72 B
        146 B
        1
        1

        DNS Request

        157.123.68.40.in-addr.arpa

      • 8.8.8.8:53
        206.23.85.13.in-addr.arpa
        dns
        71 B
        145 B
        1
        1

        DNS Request

        206.23.85.13.in-addr.arpa

      • 8.8.8.8:53
        31.243.111.52.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        31.243.111.52.in-addr.arpa

      • 8.8.8.8:53
        137.71.105.51.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        137.71.105.51.in-addr.arpa

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/4248-0-0x000000006FE40000-0x000000006FFBE000-memory.dmp

        Filesize

        1.5MB

      • memory/4248-1-0x0000000064B40000-0x0000000064B5B000-memory.dmp

        Filesize

        108KB

      • memory/4248-2-0x000000006EB40000-0x000000006EB64000-memory.dmp

        Filesize

        144KB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.