Overview
overview
9Static
static
3Language/m...32.dll
windows7-x64
3Language/m...32.dll
windows10-2004-x64
3Language/m...32.dll
windows7-x64
3Language/m...32.dll
windows10-2004-x64
3Resource/F...me.dll
windows7-x64
1Resource/F...me.dll
windows10-2004-x64
1Resource/F...UI.dll
windows7-x64
1Resource/F...UI.dll
windows10-2004-x64
1Resource/F...op.dll
windows7-x64
1Resource/F...op.dll
windows10-2004-x64
1Resource/F...to.dll
windows7-x64
1Resource/F...to.dll
windows10-2004-x64
1Resource/F...op.dll
windows7-x64
3Resource/F...op.dll
windows10-2004-x64
3Resource/F...64.dll
windows7-x64
1Resource/F...64.dll
windows10-2004-x64
1Resource/L...me.dll
windows7-x64
1Resource/L...me.dll
windows10-2004-x64
1Resource/L...UI.dll
windows7-x64
1Resource/L...UI.dll
windows10-2004-x64
1Resource/L...op.dll
windows7-x64
1Resource/L...op.dll
windows10-2004-x64
1Resource/L...to.dll
windows7-x64
1Resource/L...to.dll
windows10-2004-x64
1Resource/L...op.dll
windows7-x64
3Resource/L...op.dll
windows10-2004-x64
3Resource/opengl64.dll
windows7-x64
1Resource/opengl64.dll
windows10-2004-x64
1Set-up.exe
windows7-x64
9Set-up.exe
windows10-2004-x64
9Analysis
-
max time kernel
117s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 19:42
Static task
static1
Behavioral task
behavioral1
Sample
Language/madHcNet32.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Language/madHcNet32.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Language/mvrSettings32.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
Language/mvrSettings32.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Resource/Font/Pfm/Locals/x64/AdonisUI.ClassicTheme.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
Resource/Font/Pfm/Locals/x64/AdonisUI.ClassicTheme.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Resource/Font/Pfm/Locals/x64/AdonisUI.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
Resource/Font/Pfm/Locals/x64/AdonisUI.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Resource/Font/Pfm/Locals/x64/SQLite.Interop.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
Resource/Font/Pfm/Locals/x64/SQLite.Interop.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Resource/Font/Pfm/Locals/x86/BouncyCastle.Crypto.dll
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
Resource/Font/Pfm/Locals/x86/BouncyCastle.Crypto.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Resource/Font/Pfm/Locals/x86/SQLite.Interop.dll
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
Resource/Font/Pfm/Locals/x86/SQLite.Interop.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Resource/Font/Pfm/opengl64.dll
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
Resource/Font/Pfm/opengl64.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Resource/Locals/x64/AdonisUI.ClassicTheme.dll
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
Resource/Locals/x64/AdonisUI.ClassicTheme.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Resource/Locals/x64/AdonisUI.dll
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
Resource/Locals/x64/AdonisUI.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
Resource/Locals/x64/SQLite.Interop.dll
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
Resource/Locals/x64/SQLite.Interop.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
Resource/Locals/x86/BouncyCastle.Crypto.dll
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
Resource/Locals/x86/BouncyCastle.Crypto.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
Resource/Locals/x86/SQLite.Interop.dll
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
Resource/Locals/x86/SQLite.Interop.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
Resource/opengl64.dll
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
Resource/opengl64.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
Set-up.exe
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
Set-up.exe
Resource
win10v2004-20240802-en
General
-
Target
Language/madHcNet32.dll
-
Size
921KB
-
MD5
d22b9da713ab36102c9c3d812af8c12d
-
SHA1
371fdbf6ae6a9a2e5c0560fc94eba3290028a252
-
SHA256
95b538b47e02d0ad2bd15d47efc18695d5e379ef61568b81ef405773d9c199bb
-
SHA512
e5ae51f79403358af60bb3ea663251badac57414813f5537d763b0b95504a393fb2d34c94c4b7328ec13f58e74a7147d3a72e63e62973c4c5d80671be1c8face
-
SSDEEP
24576:TlUbWq3/gquYUJ4Vgv0eUnDaE0efxfXT95:pUR4quYUJ4VgceXE0gxfjv
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Checks SCSI registry key(s) 3 TTPs 8 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID rundll32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName rundll32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Driver rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 rundll32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID rundll32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName rundll32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Driver rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 rundll32.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\hardware\description\system\centralProcessor\2 rundll32.exe Key opened \REGISTRY\MACHINE\hardware\description\system\centralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key opened \REGISTRY\MACHINE\hardware\description\system\centralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString rundll32.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3000 rundll32.exe 3000 rundll32.exe 3000 rundll32.exe 3000 rundll32.exe 3000 rundll32.exe 3000 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3728 wrote to memory of 3000 3728 rundll32.exe 82 PID 3728 wrote to memory of 3000 3728 rundll32.exe 82 PID 3728 wrote to memory of 3000 3728 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Language\madHcNet32.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Language\madHcNet32.dll,#12⤵
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3000
-