Overview
overview
6Static
static
1ArenaBreak...g).exe
windows7-x64
6ArenaBreak...g).exe
windows10-2004-x64
6ArenaBreak...er.exe
windows7-x64
6ArenaBreak...er.exe
windows10-2004-x64
6tiny_dl/Ve...ce.exe
windows7-x64
3tiny_dl/Ve...ce.exe
windows10-2004-x64
3tiny_dl/Ve...xy.dll
windows7-x64
3tiny_dl/Ve...xy.dll
windows10-2004-x64
3Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 13:03
Static task
static1
Behavioral task
behavioral1
Sample
ArenaBreakoutInfiniteMiniloader0.0.6.235(sg).exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ArenaBreakoutInfiniteMiniloader0.0.6.235(sg).exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
ArenaBreakoutInfiniteMiniloader.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
ArenaBreakoutInfiniteMiniloader.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
tiny_dl/VersionService.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
tiny_dl/VersionService.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
tiny_dl/VersionServiceProxy.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
tiny_dl/VersionServiceProxy.dll
Resource
win10v2004-20240802-en
General
-
Target
tiny_dl/VersionServiceProxy.dll
-
Size
1.8MB
-
MD5
52225cc14cf7edf42743a94c79cab83c
-
SHA1
a151847a0a0fcaadcad5feacb2b6ab60e399f345
-
SHA256
69585960c69f26c942cc14e5a49a7c9208c86c5e612af35f9dc4e99149cae5e3
-
SHA512
7bca495aaae90d659c12457c7d4f479f582a8f96938bacafe6b2311847392e62671f4361ab691363978cb7829079299ea8cb9a9e358358c737eeb08a4f45e9d7
-
SSDEEP
49152:N9J/pUW2MknzBLD1cze5G6D0WZTdX2UPki0c9GEi:N9J/pYnFLqzeg6ol
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1924 2556 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2556 1724 rundll32.exe 29 PID 1724 wrote to memory of 2556 1724 rundll32.exe 29 PID 1724 wrote to memory of 2556 1724 rundll32.exe 29 PID 1724 wrote to memory of 2556 1724 rundll32.exe 29 PID 1724 wrote to memory of 2556 1724 rundll32.exe 29 PID 1724 wrote to memory of 2556 1724 rundll32.exe 29 PID 1724 wrote to memory of 2556 1724 rundll32.exe 29 PID 2556 wrote to memory of 1924 2556 rundll32.exe 30 PID 2556 wrote to memory of 1924 2556 rundll32.exe 30 PID 2556 wrote to memory of 1924 2556 rundll32.exe 30 PID 2556 wrote to memory of 1924 2556 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\tiny_dl\VersionServiceProxy.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\tiny_dl\VersionServiceProxy.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2556 -s 2243⤵
- Program crash
PID:1924
-
-