Overview
overview
7Static
static
7QuakeRPG320.exe
windows7-x64
7QuakeRPG320.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3DdpRpg.exe
windows7-x64
7DdpRpg.exe
windows10-2004-x64
1Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3ddpintro.htm
windows7-x64
1ddpintro.htm
windows10-2004-x64
1popup.exe
windows7-x64
7popup.exe
windows10-2004-x64
7新云软件.url
windows7-x64
1新云软件.url
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 10:06
Behavioral task
behavioral1
Sample
QuakeRPG320.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
QuakeRPG320.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
DdpRpg.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
DdpRpg.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
Uninstall.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
Uninstall.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
ddpintro.htm
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
ddpintro.htm
Resource
win10v2004-20240704-en
Behavioral task
behavioral15
Sample
popup.exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
popup.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
新云软件.url
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
新云软件.url
Resource
win10v2004-20240709-en
General
-
Target
Uninstall.exe
-
Size
58KB
-
MD5
95d238fa10af0485c2d56f5fe7cc2dc8
-
SHA1
7b1d1e5324315fa4baf11f2b1f5d5b60091a6ad5
-
SHA256
a419aa52e8d356c64429fb89b941d7897ea868077cc7cf0a15ca364e035b36e0
-
SHA512
d22a75b8368b6ff4895995292307e93fb23eba3eaf96a5109a4114899df3fa31851dcc9c10aead53dc99a5cf12c8bb5ff998871b4a239d2bd3fcb4c8bbc8b3b4
-
SSDEEP
1536:yFGGrf+wMRVrkxmJoqAELVigRzKWbm1/sJ:yFG6UVYxmJXAI0GKWbCG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4232 Au_.exe -
Loads dropped DLL 1 IoCs
pid Process 4232 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 1 IoCs
resource yara_rule behavioral10/files/0x0007000000023454-3.dat nsis_installer_1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3696 wrote to memory of 4232 3696 Uninstall.exe 86 PID 3696 wrote to memory of 4232 3696 Uninstall.exe 86 PID 3696 wrote to memory of 4232 3696 Uninstall.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5296a5f3179fa8d7a7a855eaf696ede44
SHA157aa5b71553ed282dd22c768e039a187f5c13f63
SHA256ee0ad77e681c4d0fdf1d67df5f4ca03e6bdd8e3b05dfb47a83ad5c733ed62960
SHA512bc527d1485f468e8d098057e0e38e8cb7aa6eb64d4ca30927b99b1552a3177b132b989015ff95bdf2ca046bf11a54b4b456f51e024fbc734fbb548c3499e53f6
-
Filesize
525B
MD546208c5d332cd12f2eba2125a30c3788
SHA122926efd2b4a4b28dfabceb6eff5e780822f9a8a
SHA2563d9a4de57977c5ab0260f7f54c15406c31c69cf59e72bb25cceb55b1cd905600
SHA5124cb1dd21dd158a37e65b1c559fff47dead6193640b37685acd9dd53b1e9e7ccbc9b84f17486f6057d3a7bf94b45ecc3707c19bcf471bd91d1963a722ca0385a1
-
Filesize
551B
MD5057605cefbe7f98eb73c613b5811a56c
SHA144ab832d7135e027736415b5eab01cce304defdd
SHA2569773a31b13842870a076cd1a169963d46aa3b7faae726d4ebad485deab600ae3
SHA512a688e6753786bce2ccc802264f84deaf36ed49d407c5971305e06c529e548e89654e1e936fc125b1c70c9634b9380eb34db026643652b58973924ea4fd6829e2
-
Filesize
58KB
MD595d238fa10af0485c2d56f5fe7cc2dc8
SHA17b1d1e5324315fa4baf11f2b1f5d5b60091a6ad5
SHA256a419aa52e8d356c64429fb89b941d7897ea868077cc7cf0a15ca364e035b36e0
SHA512d22a75b8368b6ff4895995292307e93fb23eba3eaf96a5109a4114899df3fa31851dcc9c10aead53dc99a5cf12c8bb5ff998871b4a239d2bd3fcb4c8bbc8b3b4