Overview
overview
9Static
static
3CampPinecrest.exe
windows11-21h2-x64
9$PLUGINSDI...er.dll
windows11-21h2-x64
3$PLUGINSDI...ls.dll
windows11-21h2-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3$PLUGINSDI...ll.dll
windows11-21h2-x64
3$PLUGINSDIR/app-64.7z
windows11-21h2-x64
3LICENSES.c...m.html
windows11-21h2-x64
5WorldWars.exe
windows11-21h2-x64
9d3dcompiler_47.dll
windows11-21h2-x64
1ffmpeg.dll
windows11-21h2-x64
1libEGL.dll
windows11-21h2-x64
1libGLESv2.dll
windows11-21h2-x64
1locales/af.ps1
windows11-21h2-x64
3locales/uk.ps1
windows11-21h2-x64
3resources/...nts.js
windows11-21h2-x64
3resources/...ent.js
windows11-21h2-x64
3resources/...ode.js
windows11-21h2-x64
3resources/...age.js
windows11-21h2-x64
3resources/...med.js
windows11-21h2-x64
3resources/...rse.js
windows11-21h2-x64
3resources/...ver.js
windows11-21h2-x64
3resources/...ver.js
windows11-21h2-x64
3resources/elevate.exe
windows11-21h2-x64
3vk_swiftshader.dll
windows11-21h2-x64
1vulkan-1.dll
windows11-21h2-x64
1$PLUGINSDI...ec.dll
windows11-21h2-x64
3$PLUGINSDI...7z.dll
windows11-21h2-x64
3$R0/Uninst...rs.exe
windows11-21h2-x64
7$PLUGINSDI...ls.dll
windows11-21h2-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3$PLUGINSDI...ll.dll
windows11-21h2-x64
3$PLUGINSDI...ec.dll
windows11-21h2-x64
3Resubmissions
02-09-2024 21:14
240902-z3rgpsxcnm 902-09-2024 21:08
240902-zyvnkaxbqj 902-09-2024 20:57
240902-zrx54sxapk 902-09-2024 20:52
240902-znsffsxajm 9Analysis
-
max time kernel
211s -
max time network
278s -
platform
windows11-21h2_x64 -
resource
win11-20240802-fr -
resource tags
arch:x64arch:x86image:win11-20240802-frlocale:fr-fros:windows11-21h2-x64systemwindows -
submitted
02-09-2024 20:57
Static task
static1
Behavioral task
behavioral1
Sample
CampPinecrest.exe
Resource
win11-20240802-fr
Behavioral task
behavioral2
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win11-20240802-fr
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win11-20240802-fr
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240802-fr
Behavioral task
behavioral5
Sample
$PLUGINSDIR/WinShell.dll
Resource
win11-20240802-fr
Behavioral task
behavioral6
Sample
$PLUGINSDIR/app-64.7z
Resource
win11-20240802-fr
Behavioral task
behavioral7
Sample
LICENSES.chromium.html
Resource
win11-20240802-fr
Behavioral task
behavioral8
Sample
WorldWars.exe
Resource
win11-20240802-fr
Behavioral task
behavioral9
Sample
d3dcompiler_47.dll
Resource
win11-20240802-fr
Behavioral task
behavioral10
Sample
ffmpeg.dll
Resource
win11-20240802-fr
Behavioral task
behavioral11
Sample
libEGL.dll
Resource
win11-20240802-fr
Behavioral task
behavioral12
Sample
libGLESv2.dll
Resource
win11-20240802-fr
Behavioral task
behavioral13
Sample
locales/af.ps1
Resource
win11-20240802-fr
Behavioral task
behavioral14
Sample
locales/uk.ps1
Resource
win11-20240802-fr
Behavioral task
behavioral15
Sample
resources/app.asar.unpacked/node_modules/hbo-dnsd/constants.js
Resource
win11-20240802-fr
Behavioral task
behavioral16
Sample
resources/app.asar.unpacked/node_modules/hbo-dnsd/convenient.js
Resource
win11-20240802-fr
Behavioral task
behavioral17
Sample
resources/app.asar.unpacked/node_modules/hbo-dnsd/encode.js
Resource
win11-20240802-fr
Behavioral task
behavioral18
Sample
resources/app.asar.unpacked/node_modules/hbo-dnsd/message.js
Resource
win11-20240802-fr
Behavioral task
behavioral19
Sample
resources/app.asar.unpacked/node_modules/hbo-dnsd/named.js
Resource
win11-20240802-fr
Behavioral task
behavioral20
Sample
resources/app.asar.unpacked/node_modules/hbo-dnsd/parse.js
Resource
win11-20240802-fr
Behavioral task
behavioral21
Sample
resources/app.asar.unpacked/node_modules/hbo-dnsd/server.js
Resource
win11-20240802-fr
Behavioral task
behavioral22
Sample
resources/app.asar.unpacked/node_modules/hbo-dnsd/util/null-server.js
Resource
win11-20240802-fr
Behavioral task
behavioral23
Sample
resources/elevate.exe
Resource
win11-20240802-fr
Behavioral task
behavioral24
Sample
vk_swiftshader.dll
Resource
win11-20240802-fr
Behavioral task
behavioral25
Sample
vulkan-1.dll
Resource
win11-20240802-fr
Behavioral task
behavioral26
Sample
$PLUGINSDIR/nsExec.dll
Resource
win11-20240802-fr
Behavioral task
behavioral27
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win11-20240802-fr
Behavioral task
behavioral28
Sample
$R0/Uninstall WorldWars.exe
Resource
win11-20240802-fr
Behavioral task
behavioral29
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win11-20240802-fr
Behavioral task
behavioral30
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240802-fr
Behavioral task
behavioral31
Sample
$PLUGINSDIR/WinShell.dll
Resource
win11-20240802-fr
Behavioral task
behavioral32
Sample
$PLUGINSDIR/nsExec.dll
Resource
win11-20240802-fr
General
-
Target
$PLUGINSDIR/nsis7z.dll
-
Size
424KB
-
MD5
80e44ce4895304c6a3a831310fbf8cd0
-
SHA1
36bd49ae21c460be5753a904b4501f1abca53508
-
SHA256
b393f05e8ff919ef071181050e1873c9a776e1a0ae8329aefff7007d0cadf592
-
SHA512
c8ba7b1f9113ead23e993e74a48c4427ae3562c1f6d9910b2bbe6806c9107cf7d94bc7d204613e4743d0cd869e00dafd4fb54aad1e8adb69c553f3b9e5bc64df
-
SSDEEP
6144:aUWQQ5O3fz0NG3ucDaEUTWfk+ZA0NrCL/k+uyoyBOX1okfW7w+Pfzqibckl:an5QEG39fPAkrE4yrBOXDfaNbck
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2772 3464 WerFault.exe 77 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3332 wrote to memory of 3464 3332 rundll32.exe 77 PID 3332 wrote to memory of 3464 3332 rundll32.exe 77 PID 3332 wrote to memory of 3464 3332 rundll32.exe 77
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsis7z.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsis7z.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 4683⤵
- Program crash
PID:2772
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3464 -ip 34641⤵PID:388