Overview
overview
10Static
static
1Setup.exe
windows10-1703-x64
10data/Engine.dll
windows10-1703-x64
9iconengine...on.dll
windows10-1703-x64
1keygen/mit.dll
windows10-1703-x64
1libEGL.dll
windows10-1703-x64
1libGLESV2.dll
windows10-1703-x64
1libeay32.dll
windows10-1703-x64
1license/backupkey.dll
windows10-1703-x64
1license/genkey.dll
windows10-1703-x64
3platforms/win32.dll
windows10-1703-x64
1platforms/win64.dll
windows10-1703-x64
1Analysis
-
max time kernel
314s -
max time network
1584s -
platform
windows10-1703_x64 -
resource
win10-20240404-de -
resource tags
arch:x64arch:x86image:win10-20240404-delocale:de-deos:windows10-1703-x64systemwindows -
submitted
25-04-2024 15:26
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win10-20240404-de
Behavioral task
behavioral2
Sample
data/Engine.dll
Resource
win10-20240404-de
Behavioral task
behavioral3
Sample
iconengines/qsvgicon.dll
Resource
win10-20240404-de
Behavioral task
behavioral4
Sample
keygen/mit.dll
Resource
win10-20240404-de
Behavioral task
behavioral5
Sample
libEGL.dll
Resource
win10-20240404-de
Behavioral task
behavioral6
Sample
libGLESV2.dll
Resource
win10-20240404-de
Behavioral task
behavioral7
Sample
libeay32.dll
Resource
win10-20240404-de
Behavioral task
behavioral8
Sample
license/backupkey.dll
Resource
win10-20240404-de
Behavioral task
behavioral9
Sample
license/genkey.dll
Resource
win10-20240404-de
Behavioral task
behavioral10
Sample
platforms/win32.dll
Resource
win10-20240404-de
Behavioral task
behavioral11
Sample
platforms/win64.dll
Resource
win10-20240404-de
General
-
Target
platforms/win32.dll
-
Size
123KB
-
MD5
5d25e492836df0ae8b869ef9077f1ca8
-
SHA1
68a50b52caaa89ba04f2f6617c9c3bf18e7f8ac1
-
SHA256
c05047a341742504f8312a0b274c19fbdcf0bfd37f76ae2277491ab8b2297a5c
-
SHA512
fc107e0b95ca7095f0fcc94d26ed1ffbc9bce74063edc8f12104e68b52da6c73b8d72c1cdb81535a135ac849ccef5fd69a2004fa2ecf6dd41a0f8658f2bd6830
-
SSDEEP
3072:YfLOXurSBlfHfG2N1X5S4RvSCzdPV0VXkjf5l:aElt3SsDdPVLjf5
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 228 wrote to memory of 4296 228 rundll32.exe rundll32.exe PID 228 wrote to memory of 4296 228 rundll32.exe rundll32.exe PID 228 wrote to memory of 4296 228 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\platforms\win32.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\platforms\win32.dll,#12⤵PID:4296
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5008