Overview
overview
3Static
static
3AssetRippe...ee.exe
windows7-x64
1AssetRippe...ee.exe
windows10-2004-x64
3Texture2DD...ve.dll
windows7-x64
1Texture2DD...ve.dll
windows10-2004-x64
1capstone.dll
windows7-x64
1capstone.dll
windows10-2004-x64
1crunch.dll
windows7-x64
1crunch.dll
windows10-2004-x64
1crunchunity.dll
windows7-x64
1crunchunity.dll
windows10-2004-x64
1nfd.dll
windows7-x64
1nfd.dll
windows10-2004-x64
1Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 18:43
Static task
static1
Behavioral task
behavioral1
Sample
AssetRipper.GUI.Free.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
AssetRipper.GUI.Free.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Texture2DDecoderNative.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Texture2DDecoderNative.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
capstone.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
capstone.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
crunch.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
crunch.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
crunchunity.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
crunchunity.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
nfd.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
nfd.dll
Resource
win10v2004-20240802-en
General
-
Target
capstone.dll
-
Size
5.3MB
-
MD5
2a849fb16e1ce371e8577f99e290f73a
-
SHA1
c87eb26c07bb923b6a04da3cbc31b49f64c0c59a
-
SHA256
f03321188a1615d044314b1183dcd9a7ffda09286c31c369d109165d4892dcbb
-
SHA512
76c2586ad4a5aa25c4cba3f429d325c4bb85dfe5c7358003ec9b48e358b2ed92059ba5c854eae569aded8c4e887d269586265f55b8d3896538bdc81b478ab3ad
-
SSDEEP
24576:kKnEVX5TCA68C07l6NA5gk15KbKfsrBo5xTVnGRI844GiO05:vAU8CSYSn5KAGBozTVZ4G
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2804 3012 rundll32.exe 31 PID 3012 wrote to memory of 2804 3012 rundll32.exe 31 PID 3012 wrote to memory of 2804 3012 rundll32.exe 31