Overview
overview
7Static
static
3Minecraft....io.exe
windows11-21h2-x64
7Data/Pytho...le.pyc
windows11-21h2-x64
3Data/Pytho...y3.pyc
windows11-21h2-x64
3Data/Pytho...ig.pyc
windows11-21h2-x64
3Data/Pytho...ke.pyc
windows11-21h2-x64
3Data/Pytho...cs.pyc
windows11-21h2-x64
3Data/Pytho...rs.pyc
windows11-21h2-x64
3Data/Pytho...as.pyc
windows11-21h2-x64
3Data/Pytho...le.pyc
windows11-21h2-x64
3Data/Pytho...me.pyc
windows11-21h2-x64
3Data/Pytho...ng.pyc
windows11-21h2-x64
3Data/Pytho...on.pyc
windows11-21h2-x64
3Data/Pytho...ort.py
windows11-21h2-x64
3Data/audio.dll
windows11-21h2-x64
3Data/file.dll
windows11-21h2-x64
3Data/gmbinaryfile.dll
windows11-21h2-x64
3Data/midiinput.dll
windows11-21h2-x64
3Data/move.bat
windows11-21h2-x64
1Data/wallpaper.bat
windows11-21h2-x64
1Data/window.dll
windows11-21h2-x64
3DialogModule.dll
windows11-21h2-x64
3ExecuteShell.dll
windows11-21h2-x64
3FileDropper.dll
windows11-21h2-x64
3Minecraft ...io.exe
windows11-21h2-x64
3NBS Player Mode.bat
windows11-21h2-x64
3NekoPresence.dll
windows11-21h2-x64
3ffmpeg.exe
windows11-21h2-x64
3ffprobe.exe
windows11-21h2-x64
3pygml.dll
windows11-21h2-x64
3python38.dll
windows11-21h2-x64
3uninstall.exe
windows11-21h2-x64
7window_set_icon.dll
windows11-21h2-x64
3Analysis
-
max time kernel
432s -
max time network
436s -
platform
windows11-21h2_x64 -
resource
win11-20240730-en -
resource tags
arch:x64arch:x86image:win11-20240730-enlocale:en-usos:windows11-21h2-x64system -
submitted
01-08-2024 20:53
Static task
static1
Behavioral task
behavioral1
Sample
Minecraft.Note.Block.Studio.exe
Resource
win11-20240730-en
Behavioral task
behavioral2
Sample
Data/Python/Lib/site-packages/numpy/typing/tests/data/pass/simple.pyc
Resource
win11-20240730-en
Behavioral task
behavioral3
Sample
Data/Python/Lib/site-packages/numpy/typing/tests/data/pass/simple_py3.pyc
Resource
win11-20240730-en
Behavioral task
behavioral4
Sample
Data/Python/Lib/site-packages/numpy/typing/tests/data/pass/ufunc_config.pyc
Resource
win11-20240730-en
Behavioral task
behavioral5
Sample
Data/Python/Lib/site-packages/numpy/typing/tests/data/pass/ufunclike.pyc
Resource
win11-20240730-en
Behavioral task
behavioral6
Sample
Data/Python/Lib/site-packages/numpy/typing/tests/data/pass/ufuncs.pyc
Resource
win11-20240730-en
Behavioral task
behavioral7
Sample
Data/Python/Lib/site-packages/numpy/typing/tests/data/pass/warnings_and_errors.pyc
Resource
win11-20240730-en
Behavioral task
behavioral8
Sample
Data/Python/Lib/site-packages/numpy/typing/tests/test_generic_alias.pyc
Resource
win11-20240730-en
Behavioral task
behavioral9
Sample
Data/Python/Lib/site-packages/numpy/typing/tests/test_isfile.pyc
Resource
win11-20240730-en
Behavioral task
behavioral10
Sample
Data/Python/Lib/site-packages/numpy/typing/tests/test_runtime.pyc
Resource
win11-20240730-en
Behavioral task
behavioral11
Sample
Data/Python/Lib/site-packages/numpy/typing/tests/test_typing.pyc
Resource
win11-20240730-en
Behavioral task
behavioral12
Sample
Data/Python/Lib/site-packages/numpy/version.pyc
Resource
win11-20240730-en
Behavioral task
behavioral13
Sample
Data/Python/audio_export.py
Resource
win11-20240730-en
Behavioral task
behavioral14
Sample
Data/audio.dll
Resource
win11-20240730-en
Behavioral task
behavioral15
Sample
Data/file.dll
Resource
win11-20240730-en
Behavioral task
behavioral16
Sample
Data/gmbinaryfile.dll
Resource
win11-20240729-en
Behavioral task
behavioral17
Sample
Data/midiinput.dll
Resource
win11-20240730-en
Behavioral task
behavioral18
Sample
Data/move.bat
Resource
win11-20240730-en
Behavioral task
behavioral19
Sample
Data/wallpaper.bat
Resource
win11-20240730-en
Behavioral task
behavioral20
Sample
Data/window.dll
Resource
win11-20240730-en
Behavioral task
behavioral21
Sample
DialogModule.dll
Resource
win11-20240730-en
Behavioral task
behavioral22
Sample
ExecuteShell.dll
Resource
win11-20240730-en
Behavioral task
behavioral23
Sample
FileDropper.dll
Resource
win11-20240730-en
Behavioral task
behavioral24
Sample
Minecraft Note Block Studio.exe
Resource
win11-20240730-en
Behavioral task
behavioral25
Sample
NBS Player Mode.bat
Resource
win11-20240730-en
Behavioral task
behavioral26
Sample
NekoPresence.dll
Resource
win11-20240730-en
Behavioral task
behavioral27
Sample
ffmpeg.exe
Resource
win11-20240730-en
Behavioral task
behavioral28
Sample
ffprobe.exe
Resource
win11-20240730-en
Behavioral task
behavioral29
Sample
pygml.dll
Resource
win11-20240730-en
Behavioral task
behavioral30
Sample
python38.dll
Resource
win11-20240730-en
Behavioral task
behavioral31
Sample
uninstall.exe
Resource
win11-20240730-en
Behavioral task
behavioral32
Sample
window_set_icon.dll
Resource
win11-20240730-en
General
-
Target
pygml.dll
-
Size
80KB
-
MD5
0f476d1eb02ab2e2a6fb8a5e74f7a3fe
-
SHA1
8cbe497127deed82e13fdffc948a48cb6b6a72b3
-
SHA256
fcd4486c4e8a8278d6ae26f4d2b23e0ecd4c5b4d0b60457f3208876637154416
-
SHA512
d4ab4eba2384e2e222fd7b902986bebda68784db4b234c90631faa2eed9290c00e9cfafb87b261ba525f4da43c9036d013ac873757e0e134d50ce6df0c3dfd9a
-
SSDEEP
1536:iipB5FEzROiZCJ+cUmPtowDWeYJ8dBblFDTJh9qxD:ii7EzROIZL3wDLs8d1lxTJh9iD
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3492 2220 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2220 1968 rundll32.exe 82 PID 1968 wrote to memory of 2220 1968 rundll32.exe 82 PID 1968 wrote to memory of 2220 1968 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\pygml.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\pygml.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 5083⤵
- Program crash
PID:3492
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2220 -ip 22201⤵PID:5100