Overview
overview
7Static
static
3anyburn_setup_x64.exe
windows10-2004-x64
7$0.exe
windows10-2004-x64
1$PLUGINSDI...pt.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3AnyBurn.exe
windows10-2004-x64
1MACDll.dll
windows10-2004-x64
1abcmd.exe
windows10-2004-x64
3lame_enc.dll
windows10-2004-x64
1libFLAC.dll
windows10-2004-x64
1libvorbis.dll
windows10-2004-x64
1Analysis
-
max time kernel
140s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2024 04:20
Static task
static1
Behavioral task
behavioral1
Sample
anyburn_setup_x64.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
$0.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstOpt.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
AnyBurn.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
MACDll.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
abcmd.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
lame_enc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
libFLAC.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
libvorbis.dll
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/InstOpt.dll
-
Size
8KB
-
MD5
a9b4e84b5c71be9aad7cbe44506a6b4e
-
SHA1
d3a7b3bed2f4f3cc3edc85e202d202a1a535d62f
-
SHA256
313648b948243e992f08eec6e567aca26c2131ca6b9d307dd11071470521baf7
-
SHA512
0c78a4d8c0c129c26fd3d99e8b04e4598e5d844d0d9f213dd318ae873ffd23db1cb06c0fec636ad7ac8a6f9306dbcae58cf4d8e7d33dca2b7a3a31e6ad36bab8
-
SSDEEP
96:S1+HVx8GJYcudkED74Kx2otnc12lDIvyYUJjlMYXJIuT+f9yFGTp:SsPulD74uh2XUtlMwIuqEFGT
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4820 4180 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4888 wrote to memory of 4180 4888 rundll32.exe 84 PID 4888 wrote to memory of 4180 4888 rundll32.exe 84 PID 4888 wrote to memory of 4180 4888 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\InstOpt.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\InstOpt.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4180 -s 6123⤵
- Program crash
PID:4820
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4180 -ip 41801⤵PID:4928