Overview
overview
9Static
static
3Game beta 1.0.0.zip
windows7-x64
1Game beta 1.0.0.zip
windows10-2004-x64
1CannonLake...em.inf
windows7-x64
1CannonLake...em.inf
windows10-2004-x64
1CannonLake...SS.inf
windows7-x64
1CannonLake...SS.inf
windows10-2004-x64
1Setup #1.exe
windows7-x64
9Setup #1.exe
windows10-2004-x64
8e1r68x64.sys
windows10-2004-x64
1setup #2.exe
windows7-x64
8setup #2.exe
windows10-2004-x64
8$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3Client.exe
windows7-x64
3Client.exe
windows10-2004-x64
3parameters.ini
windows7-x64
1parameters.ini
windows10-2004-x64
1Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 10:47
Static task
static1
Behavioral task
behavioral1
Sample
Game beta 1.0.0.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Game beta 1.0.0.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
CannonLake-HSystem.inf
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
CannonLake-HSystem.inf
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
CannonLake-HSystemLPSS.inf
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
CannonLake-HSystemLPSS.inf
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Setup #1.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
Setup #1.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
e1r68x64.sys
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
setup #2.exe
Resource
win7-20240704-en
Behavioral task
behavioral11
Sample
setup #2.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240729-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240708-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral16
Sample
Client.exe
Resource
win7-20240705-en
Behavioral task
behavioral17
Sample
Client.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral18
Sample
parameters.ini
Resource
win7-20240729-en
Behavioral task
behavioral19
Sample
parameters.ini
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/nsExec.dll
-
Size
6KB
-
MD5
b5a1f9dc73e2944a388a61411bdd8c70
-
SHA1
dc9b20df3f3810c2e81a0c54dea385704ba8bef7
-
SHA256
288100583f65a2b7acfc0c7e231c0e268c58d3067675543f627c01e82f6fd884
-
SHA512
b9c8d71b5da00f2aff7847b9ec3bd8a588afeb525f47a0df235b52f7b2233edb3928a2c8e0b493f287c923cc52a340ad6fee99822595d6591df0e97870de92a8
-
SSDEEP
96:p7GUxNkO6GR0t9GKKr1Zd8NHYVVHp4dEeY3kRnHdMqqyVgNQ3e:lXhHR0aTQN4gRHdMqJVgNH
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2356 4236 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2612 wrote to memory of 4236 2612 rundll32.exe 84 PID 2612 wrote to memory of 4236 2612 rundll32.exe 84 PID 2612 wrote to memory of 4236 2612 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsExec.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsExec.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4236 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 6123⤵
- Program crash
PID:2356
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4236 -ip 42361⤵PID:2260