Overview
overview
10Static
static
1Setup.exe
windows10-1703-x64
10data/Engine.dll
windows10-1703-x64
9iconengine...on.dll
windows10-1703-x64
1keygen/mit.dll
windows10-1703-x64
1libEGL.dll
windows10-1703-x64
1libGLESV2.dll
windows10-1703-x64
1libeay32.dll
windows10-1703-x64
1license/backupkey.dll
windows10-1703-x64
1license/genkey.dll
windows10-1703-x64
3platforms/win32.dll
windows10-1703-x64
1platforms/win64.dll
windows10-1703-x64
1Analysis
-
max time kernel
574s -
max time network
1593s -
platform
windows10-1703_x64 -
resource
win10-20240404-de -
resource tags
arch:x64arch:x86image:win10-20240404-delocale:de-deos:windows10-1703-x64systemwindows -
submitted
25/04/2024, 15:26
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win10-20240404-de
Behavioral task
behavioral2
Sample
data/Engine.dll
Resource
win10-20240404-de
Behavioral task
behavioral3
Sample
iconengines/qsvgicon.dll
Resource
win10-20240404-de
Behavioral task
behavioral4
Sample
keygen/mit.dll
Resource
win10-20240404-de
Behavioral task
behavioral5
Sample
libEGL.dll
Resource
win10-20240404-de
Behavioral task
behavioral6
Sample
libGLESV2.dll
Resource
win10-20240404-de
Behavioral task
behavioral7
Sample
libeay32.dll
Resource
win10-20240404-de
Behavioral task
behavioral8
Sample
license/backupkey.dll
Resource
win10-20240404-de
Behavioral task
behavioral9
Sample
license/genkey.dll
Resource
win10-20240404-de
Behavioral task
behavioral10
Sample
platforms/win32.dll
Resource
win10-20240404-de
Behavioral task
behavioral11
Sample
platforms/win64.dll
Resource
win10-20240404-de
General
-
Target
license/genkey.dll
-
Size
19.7MB
-
MD5
91bbf94eb4493d7da15f237143c720cd
-
SHA1
711940e07b1de1813aaba31e2507aaa89503f1fe
-
SHA256
4be9f9449603808bebcaded59bc562fd82425c95c3907d624ab91231316ab6d3
-
SHA512
f4514c73e7bcaf414e2ab131faad7fae4a2e812de8e653017beb5b4c81187949d070173b63386fae0faed39fcfc155eeba15ee6c88c73ef331043cf5c6aa87f9
-
SSDEEP
393216:xtmKYez8e1VdIN/v0WHEbq0jLi+DOANGnDxZpO74d+p5FfPv:xAKre0WmRNzf
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 644 704 WerFault.exe 73 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2696 wrote to memory of 704 2696 rundll32.exe 73 PID 2696 wrote to memory of 704 2696 rundll32.exe 73 PID 2696 wrote to memory of 704 2696 rundll32.exe 73
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\license\genkey.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\license\genkey.dll,#12⤵
- Checks processor information in registry
PID:704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 704 -s 7523⤵
- Program crash
PID:644
-
-