Overview
overview
7Static
static
7QuakeRPG320.exe
windows7-x64
7QuakeRPG320.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3DdpRpg.exe
windows7-x64
7DdpRpg.exe
windows10-2004-x64
1Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3ddpintro.htm
windows7-x64
1ddpintro.htm
windows10-2004-x64
1popup.exe
windows7-x64
7popup.exe
windows10-2004-x64
7新云软件.url
windows7-x64
1新云软件.url
windows10-2004-x64
1Analysis
-
max time kernel
139s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2024 10:06
Behavioral task
behavioral1
Sample
QuakeRPG320.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
QuakeRPG320.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
DdpRpg.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
DdpRpg.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
Uninstall.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
Uninstall.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
ddpintro.htm
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
ddpintro.htm
Resource
win10v2004-20240704-en
Behavioral task
behavioral15
Sample
popup.exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
popup.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
新云软件.url
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
新云软件.url
Resource
win10v2004-20240709-en
General
-
Target
$PLUGINSDIR/StartMenu.dll
-
Size
7KB
-
MD5
4973362a84e11dd8541387ab1694afcc
-
SHA1
b78a0fe67c07713c7abd9668b881c4bc808d9a7a
-
SHA256
7757518466b21ce175607f10599f26fff127d59a16dc10bf4ba4b7d83d13d47d
-
SHA512
65c305eced5cd81fe3a573827d62a33e400f03d5bfcb3b3a503927bc0decaedef5d74e6d1ba25a0601fe812f8d2424887d58211c3f3cea1442643f5d1c23c2fb
-
SSDEEP
96:Z+nBC0x22epxPEvC4FkWE+in1/FMvsCGRfRFqCB5tLGhEl5VN:Z+BepxPE1r8/FtmCDtSg5v
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2960 3572 WerFault.exe 84 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4868 wrote to memory of 3572 4868 rundll32.exe 84 PID 4868 wrote to memory of 3572 4868 rundll32.exe 84 PID 4868 wrote to memory of 3572 4868 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\StartMenu.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\StartMenu.dll,#12⤵PID:3572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3572 -s 6123⤵
- Program crash
PID:2960
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3572 -ip 35721⤵PID:3276