Overview
overview
10Static
static
1Setup.exe
windows7-x64
10Setup.exe
windows10-1703-x64
10datastate.dll
windows7-x64
1datastate.dll
windows10-1703-x64
3madbasic_.dll
windows7-x64
1madbasic_.dll
windows10-1703-x64
1maddisAsm_.dll
windows7-x64
1maddisAsm_.dll
windows10-1703-x64
1madexcept_.dll
windows7-x64
1madexcept_.dll
windows10-1703-x64
1rtl120.dll
windows7-x64
1rtl120.dll
windows10-1703-x64
1sqlite3.dll
windows7-x64
3sqlite3.dll
windows10-1703-x64
3vcl120.dll
windows7-x64
1vcl120.dll
windows10-1703-x64
1vclx120.dll
windows7-x64
3vclx120.dll
windows10-1703-x64
3Resubmissions
19-07-2024 19:18
240719-x1c57azane 10Analysis
-
max time kernel
141s -
max time network
136s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
19-07-2024 19:18
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
datastate.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
datastate.dll
Resource
win10-20240611-en
Behavioral task
behavioral5
Sample
madbasic_.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
madbasic_.dll
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
maddisAsm_.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
maddisAsm_.dll
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
madexcept_.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
madexcept_.dll
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
rtl120.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
rtl120.dll
Resource
win10-20240404-en
Behavioral task
behavioral13
Sample
sqlite3.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
sqlite3.dll
Resource
win10-20240611-en
Behavioral task
behavioral15
Sample
vcl120.dll
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
vcl120.dll
Resource
win10-20240404-en
Behavioral task
behavioral17
Sample
vclx120.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
vclx120.dll
Resource
win10-20240404-en
General
-
Target
vclx120.dll
-
Size
220KB
-
MD5
7daa2b7fe529b45101a399b5ebf0a416
-
SHA1
fd73f3561d0cebe341a6c380681fb08841fa5ce6
-
SHA256
2bdf023c439010ce0a786ec75d943a80a8f01363712bbf69afc29d3e2b5306ed
-
SHA512
8e9ec71943c412fe95563e488d91e6ef0041c16a08654ff14b11953f134007657d1e6ec95952f6b9c8b8567a35368840618db06e5cd99abc43ae495a3fbc6b96
-
SSDEEP
3072:F4af8kXL6nX0YXjvkWQ5vYhbNkWPFOEJ8YZbjeTl0Y25zFgYBzRKy6sB65avEtAt:Oaf8kLWL7Xov8bNxdOmrfgYmHA6I
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 3920 4140 WerFault.exe 73 -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid Process procid_target PID 2768 wrote to memory of 4140 2768 rundll32.exe 73 PID 2768 wrote to memory of 4140 2768 rundll32.exe 73 PID 2768 wrote to memory of 4140 2768 rundll32.exe 73
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\vclx120.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\vclx120.dll,#12⤵PID:4140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 6963⤵
- Program crash
PID:3920
-
-