Overview
overview
10Static
static
3Benefits-S...om.exe
windows7-x64
7Benefits-S...om.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3Unbegrudge...hr.app
macos-10.15-amd64
1Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 18:10
Static task
static1
Behavioral task
behavioral1
Sample
Benefits-Signature-RequestsPlan#241205.com.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Benefits-Signature-RequestsPlan#241205.com.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
Unbegrudged/retouchr.app
Resource
macos-20240410-en
General
-
Target
$PLUGINSDIR/nsDialogs.dll
-
Size
9KB
-
MD5
eb2c74e05b30b29887b3219f4ea3fdab
-
SHA1
91173d46b34e7bae57acabdbd239111b5bcc4d9e
-
SHA256
d253ca5aba34b925796777893f114cc741b015af7868022ab1db2341288c55ed
-
SHA512
1bb035260223ec585170f891c2624b9ae98671f225e74b913b40bb77b66e3b9c2016037bc8e4b0ae16367d82590a60a0a3bd95d05139ea2454f02020d1b54dae
-
SSDEEP
96:oVDlD3cd51V1zL7xqEscxM2DjDf3GEst+Nt+jvcx488qndYv0PLE:oVp34z/x3sREskpxjdO0PLE
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2108 1100 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1084 wrote to memory of 1100 1084 rundll32.exe rundll32.exe PID 1084 wrote to memory of 1100 1084 rundll32.exe rundll32.exe PID 1084 wrote to memory of 1100 1084 rundll32.exe rundll32.exe PID 1084 wrote to memory of 1100 1084 rundll32.exe rundll32.exe PID 1084 wrote to memory of 1100 1084 rundll32.exe rundll32.exe PID 1084 wrote to memory of 1100 1084 rundll32.exe rundll32.exe PID 1084 wrote to memory of 1100 1084 rundll32.exe rundll32.exe PID 1100 wrote to memory of 2108 1100 rundll32.exe WerFault.exe PID 1100 wrote to memory of 2108 1100 rundll32.exe WerFault.exe PID 1100 wrote to memory of 2108 1100 rundll32.exe WerFault.exe PID 1100 wrote to memory of 2108 1100 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsDialogs.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsDialogs.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1100 -s 2443⤵
- Program crash
PID:2108