Analysis

  • max time kernel
    94s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/08/2024, 12:31

General

  • Target

    GarenaTV_UI.dll

  • Size

    395KB

  • MD5

    a8e8f3204ede6b24b7838d0f0eedcfbd

  • SHA1

    5e71c85311ea871a25ff12631b3282fcf68ae680

  • SHA256

    12831910bf2af04483fe80cdce003309ecbc20b074e65f918ab73b0056911ffa

  • SHA512

    357d771a95bc6ab2bfa97482fa1f31b7e9ecf529b096110054ee78bc3526d8f697873dcfe4d652355a1d1d284004d41d1f26e3ec9bf7c03851e8c4eb3e4a29b0

  • SSDEEP

    12288:PANfedg3V/RaV2khBnLA1byW0L9513pn:UVZZkTLb5L951N

Score
3/10

Malware Config

Signatures

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\GarenaTV_UI.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4640
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\GarenaTV_UI.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3700
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3700 -s 608
        3⤵
        • Program crash
        PID:4220
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3700 -s 836
        3⤵
        • Program crash
        PID:4736
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 3700 -ip 3700
    1⤵
      PID:2712
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3700 -ip 3700
      1⤵
        PID:844

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3700-2-0x00000000020A0000-0x000000000211A000-memory.dmp

        Filesize

        488KB

      • memory/3700-0-0x0000000000740000-0x0000000000752000-memory.dmp

        Filesize

        72KB