Overview
overview
6Static
static
1drw_trial_...86.exe
windows7-x64
6drw_trial_...86.exe
windows10-2004-x64
6$TEMP/down...er.exe
windows7-x64
1$TEMP/down...er.exe
windows10-2004-x64
1$TEMP/down...ap.dll
windows7-x64
3$TEMP/down...ap.dll
windows10-2004-x64
3$TEMP/down...xe.exe
windows7-x64
1$TEMP/down...xe.exe
windows10-2004-x64
1$TEMP/down...up.exe
windows7-x64
1$TEMP/down...up.exe
windows10-2004-x64
1Analysis
-
max time kernel
140s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02-05-2024 17:55
Static task
static1
Behavioral task
behavioral1
Sample
drw_trial_installer.17146652176883b238686.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
drw_trial_installer.17146652176883b238686.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$TEMP/downloader_easeus/2.0.0/2trial/EDownloader.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$TEMP/downloader_easeus/2.0.0/2trial/EDownloader.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
$TEMP/downloader_easeus/2.0.0/2trial/aliyun/AliyunWrap.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
$TEMP/downloader_easeus/2.0.0/2trial/aliyun/AliyunWrap.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
$TEMP/downloader_easeus/2.0.0/2trial/aliyun/AliyunWrapExe.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
$TEMP/downloader_easeus/2.0.0/2trial/aliyun/AliyunWrapExe.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral9
Sample
$TEMP/downloader_easeus/2.0.0/2trial/aliyun/InfoForSetup.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$TEMP/downloader_easeus/2.0.0/2trial/aliyun/InfoForSetup.exe
Resource
win10v2004-20240226-en
General
-
Target
$TEMP/downloader_easeus/2.0.0/2trial/aliyun/AliyunWrap.dll
-
Size
482KB
-
MD5
58968e221f2522d98dbfe7574d0c44aa
-
SHA1
424b55216f2c832202c01363e013546380f5312a
-
SHA256
265170e701ec453b13249e7a4e4f401b87fae79442cce77060213ebcd03828c0
-
SHA512
9bba6ffbec9b6d3de7b530b056098465a54b66494db7e7ca82e8c98802fb5a1cb500f5d505387f2a33fb9a42a533d5838b1125ef14afad11285410652c6f07b5
-
SSDEEP
12288:YaK0OuDBlYPIj/q9DQsEfExtrlp87pMaIPuboWMlyF0Ps:W9DeuBc/IPu8WMAF0Ps
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1100 3108 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1520 wrote to memory of 3108 1520 rundll32.exe rundll32.exe PID 1520 wrote to memory of 3108 1520 rundll32.exe rundll32.exe PID 1520 wrote to memory of 3108 1520 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$TEMP\downloader_easeus\2.0.0\2trial\aliyun\AliyunWrap.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$TEMP\downloader_easeus\2.0.0\2trial\aliyun\AliyunWrap.dll,#12⤵PID:3108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3108 -s 6723⤵
- Program crash
PID:1100
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3108 -ip 31081⤵PID:752