Overview
overview
7Static
static
38c9e31e716...f2.exe
windows7-x64
78c9e31e716...f2.exe
windows10-2004-x64
7$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...in.dll
windows7-x64
1$PLUGINSDI...in.dll
windows10-2004-x64
1$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 02:51
Static task
static1
Behavioral task
behavioral1
Sample
8c9e31e716cc7ab5de246976e9d6a683233e97688e627d3d9202f096aa598af2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8c9e31e716cc7ab5de246976e9d6a683233e97688e627d3d9202f096aa598af2.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/FileInfo.dll
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/FileInfo.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/RCPicPlugin.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/RCPicPlugin.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240426-en
General
-
Target
$PLUGINSDIR/FileInfo.dll
-
Size
99KB
-
MD5
a8ff51fb2f388c3a0606b966721aafb0
-
SHA1
176353086425189befc7cf76fc6e2c9658c95114
-
SHA256
0f140c765d1797150d150e75bf7c3c3b25844fa0427e3473fa28dae60ddd78a8
-
SHA512
8b5d377a7d544e0ed9a724e004ae2afc20270c44c1a7659340ad0654d233ede103cdec3abee12ae954db142716bcd7a94fb15064a061e187e33bef8e478c3a83
-
SSDEEP
1536:xykK7mqiOHpUNIL28DiH/O5Eu6wPy848ETva0RvW7C7anEz+DrKVZ:xNimNkiH/1SUy7C7anEz+D
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4640 560 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3080 wrote to memory of 560 3080 rundll32.exe rundll32.exe PID 3080 wrote to memory of 560 3080 rundll32.exe rundll32.exe PID 3080 wrote to memory of 560 3080 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\FileInfo.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\FileInfo.dll,#12⤵PID:560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 560 -s 6163⤵
- Program crash
PID:4640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 560 -ip 5601⤵PID:4904