Analysis

  • max time kernel
    140s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25-07-2024 21:50

General

  • Target

    UltimMC/libLauncher_iconfix.dll

  • Size

    127KB

  • MD5

    334a4297adc8c732fd71ff5832ea670b

  • SHA1

    f8a7c3e4ab0eeaa04d1aa187270466e6c149cd9f

  • SHA256

    0a817bbb506a5996fb0c57c36e5b43009289769b8f6facdf58fc1f475be17aef

  • SHA512

    4cf5fa9e16c1485f3f164038c9acf140fc85dcac3ebe16337c8d2d9292fd15d942ec07bc97e8f55a64766787aa76ce5f3b2dfa460ef76d4a44e2344b32d75cc6

  • SSDEEP

    3072:7UhA8S8fo6OjGyy1dWmC00TEUmIKOpS8aNx5tnzgp:YhA8S8fo6OjGJ1dWLTEUmIKOpS8aNx5Q

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\UltimMC\libLauncher_iconfix.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4196
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\UltimMC\libLauncher_iconfix.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4932
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4932 -s 684
        3⤵
        • Program crash
        PID:3472

Network

MITRE ATT&CK Matrix ATT&CK v13

Discovery

System Location Discovery

1
T1614

System Language Discovery

1
T1614.001

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4932-0-0x00000000049C0000-0x0000000004EEF000-memory.dmp
    Filesize

    5.2MB

  • memory/4932-4-0x00000000049C1000-0x0000000004C69000-memory.dmp
    Filesize

    2.7MB

  • memory/4932-3-0x00000000049C0000-0x0000000004EEF000-memory.dmp
    Filesize

    5.2MB

  • memory/4932-7-0x00000000049C0000-0x0000000004EEF000-memory.dmp
    Filesize

    5.2MB

  • memory/4932-6-0x0000000070940000-0x000000007095C000-memory.dmp
    Filesize

    112KB

  • memory/4932-8-0x0000000070940000-0x000000007095C000-memory.dmp
    Filesize

    112KB

  • memory/4932-10-0x000000006E940000-0x000000006E964000-memory.dmp
    Filesize

    144KB

  • memory/4932-12-0x0000000064940000-0x0000000064954000-memory.dmp
    Filesize

    80KB

  • memory/4932-11-0x000000006FC40000-0x000000006FD41000-memory.dmp
    Filesize

    1.0MB

  • memory/4932-9-0x0000000068AC0000-0x0000000068ACC000-memory.dmp
    Filesize

    48KB

  • memory/4932-13-0x0000000061940000-0x0000000061EB5000-memory.dmp
    Filesize

    5.5MB

  • memory/4932-14-0x00000000049C0000-0x0000000004EEF000-memory.dmp
    Filesize

    5.2MB