Overview
overview
7Static
static
7Bunifu_UI_v1.5.3.dll
windows7-x64
1Bunifu_UI_v1.5.3.dll
windows10-2004-x64
1Indicium-Supra.dll
windows7-x64
1Indicium-Supra.dll
windows10-2004-x64
1ScintillaNET.dll
windows7-x64
1ScintillaNET.dll
windows10-2004-x64
1krnl.dll
windows7-x64
7krnl.dll
windows10-2004-x64
7krnl.exe
windows7-x64
7krnl.exe
windows10-2004-x64
7Analysis
-
max time kernel
125s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 22:19
Behavioral task
behavioral1
Sample
Bunifu_UI_v1.5.3.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
Bunifu_UI_v1.5.3.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
Indicium-Supra.dll
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
Indicium-Supra.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
ScintillaNET.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
ScintillaNET.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
krnl.dll
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
krnl.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
krnl.exe
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
krnl.exe
Resource
win10v2004-20240508-en
General
-
Target
krnl.dll
-
Size
1.1MB
-
MD5
94b8c1ee2252d07be68a8a154f1be59b
-
SHA1
c8f528fd409b54006c6ecd4bd0be0fe3209faa54
-
SHA256
f002b087f08dac8873e91f04cd23f675c5a8666e70a6032afe7e582b3ac1b551
-
SHA512
4f265e0f3f883e406299f994ed5f08bfb93ad154ae645791cb5668aac211f922660decf1836904928815a859e215e1c312ecda381fe986888e31fe1182ad75b9
-
SSDEEP
24576:XV3M3R/Wa288SakvW8P3GY6j5O5YKS+5pV3Munt:l3MVWa28lvuYsO5YKX5H3MSt
Malware Config
Signatures
-
resource yara_rule behavioral8/memory/2040-0-0x0000000074E50000-0x000000007501A000-memory.dmp vmprotect behavioral8/memory/2040-1-0x0000000074E50000-0x000000007501A000-memory.dmp vmprotect -
Program crash 1 IoCs
pid pid_target Process procid_target 1516 2040 WerFault.exe 89 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4400 wrote to memory of 2040 4400 rundll32.exe 89 PID 4400 wrote to memory of 2040 4400 rundll32.exe 89 PID 4400 wrote to memory of 2040 4400 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\krnl.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\krnl.dll,#12⤵PID:2040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2040 -s 5723⤵
- Program crash
PID:1516
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2040 -ip 20401⤵PID:2500
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4064,i,3595107284059830391,18018199024659337217,262144 --variations-seed-version --mojo-platform-channel-handle=4380 /prefetch:81⤵PID:3032