Overview
overview
8Static
static
3doudou_BL_...ai.exe
windows7-x64
7doudou_BL_...ai.exe
windows10-2004-x64
7$PLUGINSDI...up.exe
windows7-x64
8$PLUGINSDI...up.exe
windows10-2004-x64
8$PLUGINSDI...sW.dll
windows7-x64
3$PLUGINSDI...sW.dll
windows10-2004-x64
3$PLUGINSDI...86.exe
windows7-x64
7$PLUGINSDI...86.exe
windows10-2004-x64
7Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-08-2024 17:54
Static task
static1
Behavioral task
behavioral1
Sample
doudou_BL_OPENAZ_3_&W66b2626200003b0bW&ai.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
doudou_BL_OPENAZ_3_&W66b2626200003b0bW&ai.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/MicrosoftEdgeWebview2Setup.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/MicrosoftEdgeWebview2Setup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsProcessW.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsProcessW.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/windowsdesktop-runtime-7.0.11-win-x86.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/windowsdesktop-runtime-7.0.11-win-x86.exe
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/nsProcessW.dll
-
Size
4KB
-
MD5
f0438a894f3a7e01a4aae8d1b5dd0289
-
SHA1
b058e3fcfb7b550041da16bf10d8837024c38bf6
-
SHA256
30c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11
-
SHA512
f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7
-
SSDEEP
48:Sz4joMeH+Iwdf8Rom/L+rOnnk5/OCnXeAdbdOAa4GPI+CJ87eILzlq7gthwIsEQW:64c/eFdfS/SSnkxNa4G+ueqPuCtGsj
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2608 2500 WerFault.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4548 wrote to memory of 2500 4548 rundll32.exe rundll32.exe PID 4548 wrote to memory of 2500 4548 rundll32.exe rundll32.exe PID 4548 wrote to memory of 2500 4548 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsProcessW.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsProcessW.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2500 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2500 -s 6003⤵
- Program crash
PID:2608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2500 -ip 25001⤵PID:4340