Overview
overview
7Static
static
3SecuriteIn...30.exe
windows7-x64
7SecuriteIn...30.exe
windows10-2004-x64
7chrome/con...enu.js
windows7-x64
3chrome/con...enu.js
windows10-2004-x64
3chrome/con...ure.js
windows7-x64
3chrome/con...ure.js
windows10-2004-x64
3chrome/con...eAs.js
windows7-x64
3chrome/con...eAs.js
windows10-2004-x64
3components...on.dll
windows7-x64
1components...on.dll
windows10-2004-x64
1defaults/p...enu.js
windows7-x64
3defaults/p...enu.js
windows10-2004-x64
3$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...ts.exe
windows7-x64
1$PLUGINSDI...ts.exe
windows10-2004-x64
1$PLUGINSDI...32.exe
windows7-x64
1$PLUGINSDI...32.exe
windows10-2004-x64
1$PLUGINSDI...ed.exe
windows7-x64
1$PLUGINSDI...ed.exe
windows10-2004-x64
1$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...Ex.dll
windows7-x64
3$PLUGINSDI...Ex.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3chrome/con...enu.js
windows7-x64
3chrome/con...enu.js
windows10-2004-x64
3chrome/con...ure.js
windows7-x64
3chrome/con...ure.js
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 15:19
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan-PSW.MSIL.BlackGuard.c.4.3630.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan-PSW.MSIL.BlackGuard.c.4.3630.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
chrome/content/bc_context_menu.js
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
chrome/content/bc_context_menu.js
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
chrome/content/bc_media_capture.js
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
chrome/content/bc_media_capture.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
chrome/content/unknownContentTypeSaveAs.js
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
chrome/content/unknownContentTypeSaveAs.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
components/IBitCometExtension.dll
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
components/IBitCometExtension.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
defaults/preferences/bc_context_menu.js
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
defaults/preferences/bc_context_menu.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/BcNsisHelper.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/BcNsisHelper.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/BitComet_stats.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/BitComet_stats.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/CometBird_Downloader_win32.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/CometBird_Downloader_win32.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/GoogleToolbarInstaller_download_signed.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/GoogleToolbarInstaller_download_signed.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240215-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/InstallOptionsEx.dll
Resource
win7-20240419-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/InstallOptionsEx.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
chrome/content/bc_context_menu.js
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
chrome/content/bc_context_menu.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
chrome/content/bc_media_capture.js
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
chrome/content/bc_media_capture.js
Resource
win10v2004-20240426-en
General
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
301a9c8739ed3ed955a1bdc472d26f32
-
SHA1
a830ab9ae6e8d046b7ab2611bea7a0a681f29a43
-
SHA256
6ec9fde89f067b1807325b05089c3ae4822ce7640d78e6f32dbe52f582de1d92
-
SHA512
41d88489ecb5ec64191493a1ed2ed7095678955d9fa72cccea2ae76dd794e62e7b5bd3aa2c313fb4bdf41c2f89f29e4cafe43d564ecad80fce1bf0a240b1e094
-
SSDEEP
192:hCPej3uzvJwqJMQKN4GbeWZksMI4ETWcEbcBZ8ep2Kra7yAG:hCQ2HgN4GbeWmbI4Eybogia7yA
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2088 3028 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1724 wrote to memory of 3028 1724 rundll32.exe rundll32.exe PID 1724 wrote to memory of 3028 1724 rundll32.exe rundll32.exe PID 1724 wrote to memory of 3028 1724 rundll32.exe rundll32.exe PID 1724 wrote to memory of 3028 1724 rundll32.exe rundll32.exe PID 1724 wrote to memory of 3028 1724 rundll32.exe rundll32.exe PID 1724 wrote to memory of 3028 1724 rundll32.exe rundll32.exe PID 1724 wrote to memory of 3028 1724 rundll32.exe rundll32.exe PID 3028 wrote to memory of 2088 3028 rundll32.exe WerFault.exe PID 3028 wrote to memory of 2088 3028 rundll32.exe WerFault.exe PID 3028 wrote to memory of 2088 3028 rundll32.exe WerFault.exe PID 3028 wrote to memory of 2088 3028 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3028 -s 2243⤵
- Program crash