Overview
overview
7Static
static
7MPRSetup.exe
windows7-x64
7MPRSetup.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3HookLib.dll
windows7-x64
1HookLib.dll
windows10-2004-x64
1MPR.exe
windows7-x64
7MPR.exe
windows10-2004-x64
7UpdateChecker.exe
windows7-x64
1UpdateChecker.exe
windows10-2004-x64
1Analysis
-
max time kernel
92s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 21:43
Behavioral task
behavioral1
Sample
MPRSetup.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
MPRSetup.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
HookLib.dll
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
HookLib.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
MPR.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
MPR.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
UpdateChecker.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
UpdateChecker.exe
Resource
win10v2004-20240412-en
General
-
Target
$PLUGINSDIR/LangDLL.dll
-
Size
5KB
-
MD5
2c08daee8c2b1bb8a2f6e5ba27022699
-
SHA1
0103d528067531830053cbd7a0f6fe9ef4c8ee81
-
SHA256
9abc4122846abda7a3233e3ea8b363046e2a57ca625bb6239c4ddd55b8584352
-
SHA512
44f57802c208bd9559956393df3f3f4839703401bb21a9a35caf336f28da37bc45ac76071e304563708d3e470cb704222d478e441111762378cd07da5e6040b4
-
SSDEEP
48:Sn8Q/z+vUML8eYXICmlmGYKHz0JSpXSxwo6mpwzcR3RqG8aEJ/ABofgMGKO:yz+MM4eqmvz0JScx56mpwzAhWVGV
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 5060 2456 WerFault.exe 83 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5020 wrote to memory of 2456 5020 rundll32.exe 83 PID 5020 wrote to memory of 2456 5020 rundll32.exe 83 PID 5020 wrote to memory of 2456 5020 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\LangDLL.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\LangDLL.dll,#12⤵PID:2456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 6003⤵
- Program crash
PID:5060
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2456 -ip 24561⤵PID:1116