Overview
overview
10Static
static
39612bdf95a...36.exe
windows7-x64
109612bdf95a...36.exe
windows10-2004-x64
10$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1$PLUGINSDI...ge.dll
windows7-x64
1$PLUGINSDI...ge.dll
windows10-2004-x64
1$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3Rapparees/...rs.app
macos-10.15-amd64
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:46
Static task
static1
Behavioral task
behavioral1
Sample
9612bdf95adfb2b39930e025fa8e7b14ac96112b232586ddd45fc839eb59c836.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9612bdf95adfb2b39930e025fa8e7b14ac96112b232586ddd45fc839eb59c836.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Banner.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Banner.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/BgImage.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/BgImage.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
Rapparees/Depredatory/Sabbatters.app
Resource
macos-20240410-en
General
-
Target
$PLUGINSDIR/nsDialogs.dll
-
Size
9KB
-
MD5
82c3f38cd34739872af07443c65d0bd8
-
SHA1
1f4ee2d394404a291eda6419f856adaf4b960237
-
SHA256
59cdb2c12d5635fd25af4007b70222507948be41fa9885b7f07967c2510a5311
-
SHA512
3a81c0613b1ea906ad4f103b02620217de69a8676dbb7ec41cf31f342a0a74562815a8d4f2efe9866fc16365f58524ac71652e99920acea355f020028775743d
-
SSDEEP
192:ow8cSzvTyl4tgi8pPjQM0PuAg0YNy+IFtSP:lBSzm+t18pZ0WAg0R+IFg
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2640 2192 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2348 wrote to memory of 2192 2348 rundll32.exe rundll32.exe PID 2348 wrote to memory of 2192 2348 rundll32.exe rundll32.exe PID 2348 wrote to memory of 2192 2348 rundll32.exe rundll32.exe PID 2348 wrote to memory of 2192 2348 rundll32.exe rundll32.exe PID 2348 wrote to memory of 2192 2348 rundll32.exe rundll32.exe PID 2348 wrote to memory of 2192 2348 rundll32.exe rundll32.exe PID 2348 wrote to memory of 2192 2348 rundll32.exe rundll32.exe PID 2192 wrote to memory of 2640 2192 rundll32.exe WerFault.exe PID 2192 wrote to memory of 2640 2192 rundll32.exe WerFault.exe PID 2192 wrote to memory of 2640 2192 rundll32.exe WerFault.exe PID 2192 wrote to memory of 2640 2192 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsDialogs.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsDialogs.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2192 -s 2443⤵
- Program crash