Overview
overview
9Static
static
3windirstat...up.exe
windows11-21h2-x64
9$PLUGINSDI...ns.dll
windows11-21h2-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3$_5_.exe
windows11-21h2-x64
9Uninstall.exe
windows11-21h2-x64
7$PLUGINSDI...em.dll
windows11-21h2-x64
3shfolder.dll
windows11-21h2-x64
3wdsh0407.chm
windows11-21h2-x64
1wdsh040e.chm
windows11-21h2-x64
1wdsh0415.chm
windows11-21h2-x64
1wdsr0405.dll
windows11-21h2-x64
1wdsr0407.dll
windows11-21h2-x64
1wdsr040a.dll
windows11-21h2-x64
1wdsr040b.dll
windows11-21h2-x64
1wdsr040c.dll
windows11-21h2-x64
1wdsr040e.dll
windows11-21h2-x64
1wdsr0410.dll
windows11-21h2-x64
1wdsr0413.dll
windows11-21h2-x64
1wdsr0415.dll
windows11-21h2-x64
1wdsr0419.dll
windows11-21h2-x64
1wdsr0425.dll
windows11-21h2-x64
1windirstat.chm
windows11-21h2-x64
1windirstat.exe
windows11-21h2-x64
9Analysis
-
max time kernel
90s -
max time network
204s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
27-07-2024 17:44
Static task
static1
Behavioral task
behavioral1
Sample
windirstat1_1_2_setup.exe
Resource
win11-20240709-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win11-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240709-en
Behavioral task
behavioral4
Sample
$_5_.exe
Resource
win11-20240709-en
Behavioral task
behavioral5
Sample
Uninstall.exe
Resource
win11-20240709-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240709-en
Behavioral task
behavioral7
Sample
shfolder.dll
Resource
win11-20240709-en
Behavioral task
behavioral8
Sample
wdsh0407.chm
Resource
win11-20240709-en
Behavioral task
behavioral9
Sample
wdsh040e.chm
Resource
win11-20240709-en
Behavioral task
behavioral10
Sample
wdsh0415.chm
Resource
win11-20240709-en
Behavioral task
behavioral11
Sample
wdsr0405.dll
Resource
win11-20240709-en
Behavioral task
behavioral12
Sample
wdsr0407.dll
Resource
win11-20240709-en
Behavioral task
behavioral13
Sample
wdsr040a.dll
Resource
win11-20240709-en
Behavioral task
behavioral14
Sample
wdsr040b.dll
Resource
win11-20240709-en
Behavioral task
behavioral15
Sample
wdsr040c.dll
Resource
win11-20240709-en
Behavioral task
behavioral16
Sample
wdsr040e.dll
Resource
win11-20240709-en
Behavioral task
behavioral17
Sample
wdsr0410.dll
Resource
win11-20240709-en
Behavioral task
behavioral18
Sample
wdsr0413.dll
Resource
win11-20240709-en
Behavioral task
behavioral19
Sample
wdsr0415.dll
Resource
win11-20240709-en
Behavioral task
behavioral20
Sample
wdsr0419.dll
Resource
win11-20240709-en
Behavioral task
behavioral21
Sample
wdsr0425.dll
Resource
win11-20240709-en
Behavioral task
behavioral22
Sample
windirstat.chm
Resource
win11-20240709-en
Behavioral task
behavioral23
Sample
windirstat.exe
Resource
win11-20240709-en
General
-
Target
$PLUGINSDIR/System.dll
-
Size
10KB
-
MD5
4125926391466fdbe8a4730f2374b033
-
SHA1
fdd23034ada72d2537939ac6755d7f7c0e9b3f0e
-
SHA256
6692bd93bcd04146831652780c1170da79aa3784c3c070d95fb1580e339de6c5
-
SHA512
32a1cf96842454b3c3641316ee39051ae024bdce9e88ac236eadad531f2c0a08d46b77d525f7d994c9a5af4cc9a391d30ee92b9ec782b7fb9a42c76f0f52a008
-
SSDEEP
192:4O6dJA/ruAFEiUdWWE6hE5RYUdJfbub1algMO:RKAFERdlxhGRYUzqZal
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1664 480 WerFault.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3368 wrote to memory of 480 3368 rundll32.exe rundll32.exe PID 3368 wrote to memory of 480 3368 rundll32.exe rundll32.exe PID 3368 wrote to memory of 480 3368 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:480 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 480 -s 4603⤵
- Program crash
PID:1664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 480 -ip 4801⤵PID:4748