Overview
overview
7Static
static
750ffeff8f7...0N.exe
windows7-x64
750ffeff8f7...0N.exe
windows10-2004-x64
7$LOCALAPPD...und.js
windows7-x64
3$LOCALAPPD...und.js
windows10-2004-x64
3$LOCALAPPD...rap.js
windows7-x64
3$LOCALAPPD...rap.js
windows10-2004-x64
3$LOCALAPPD...olo.js
windows7-x64
3$LOCALAPPD...olo.js
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...ON.dll
windows7-x64
7$PLUGINSDI...ON.dll
windows10-2004-x64
7$PLUGINSDI...le.dll
windows7-x64
3$PLUGINSDI...le.dll
windows10-2004-x64
3$_8_/exten...rap.js
windows7-x64
3$_8_/exten...rap.js
windows10-2004-x64
3$_8_/exten...mod.js
windows7-x64
3$_8_/exten...mod.js
windows10-2004-x64
3$_8_/exten...ing.js
windows7-x64
3$_8_/exten...ing.js
windows10-2004-x64
3$_8_/exten...est.js
windows7-x64
3$_8_/exten...est.js
windows10-2004-x64
3$_8_/exten...ows.js
windows7-x64
3$_8_/exten...ows.js
windows10-2004-x64
3$_8_/exten...ner.js
windows7-x64
3$_8_/exten...ner.js
windows10-2004-x64
3$_8_/exten...ils.js
windows7-x64
3$_8_/exten...ils.js
windows10-2004-x64
3Analysis
-
max time kernel
114s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 23:52
Behavioral task
behavioral1
Sample
50ffeff8f7ccb47b9f9b677a705034c0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
50ffeff8f7ccb47b9f9b677a705034c0N.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$LOCALAPPDATA/Google/Chrome/User Data/Default/Extensions/mjildcbkilmkddbbpbjljljdmmlfeppl/5.0_0/background.js
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$LOCALAPPDATA/Google/Chrome/User Data/Default/Extensions/mjildcbkilmkddbbpbjljljdmmlfeppl/5.0_0/background.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$LOCALAPPDATA/Google/Chrome/User Data/Default/Extensions/mjildcbkilmkddbbpbjljljdmmlfeppl/5.0_0/bootstrap.js
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$LOCALAPPDATA/Google/Chrome/User Data/Default/Extensions/mjildcbkilmkddbbpbjljljdmmlfeppl/5.0_0/bootstrap.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$LOCALAPPDATA/Google/Chrome/User Data/Default/Extensions/mjildcbkilmkddbbpbjljljdmmlfeppl/5.0_0/marcopolo.js
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$LOCALAPPDATA/Google/Chrome/User Data/Default/Extensions/mjildcbkilmkddbbpbjljljdmmlfeppl/5.0_0/marcopolo.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsJSON.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsJSON.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/nsisFile.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsisFile.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
$_8_/extensions/getsav-in@jetpack/bootstrap.js
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$_8_/extensions/getsav-in@jetpack/bootstrap.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$_8_/extensions/getsav-in@jetpack/resources/addon-kit/lib/page-mod.js
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
$_8_/extensions/getsav-in@jetpack/resources/addon-kit/lib/page-mod.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
$_8_/extensions/getsav-in@jetpack/resources/addon-kit/lib/private-browsing.js
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
$_8_/extensions/getsav-in@jetpack/resources/addon-kit/lib/private-browsing.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
$_8_/extensions/getsav-in@jetpack/resources/addon-kit/lib/request.js
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
$_8_/extensions/getsav-in@jetpack/resources/addon-kit/lib/request.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
$_8_/extensions/getsav-in@jetpack/resources/addon-kit/lib/windows.js
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
$_8_/extensions/getsav-in@jetpack/resources/addon-kit/lib/windows.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
$_8_/extensions/getsav-in@jetpack/resources/api-utils/lib/addon/runner.js
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
$_8_/extensions/getsav-in@jetpack/resources/api-utils/lib/addon/runner.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
$_8_/extensions/getsav-in@jetpack/resources/api-utils/lib/api-utils.js
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
$_8_/extensions/getsav-in@jetpack/resources/api-utils/lib/api-utils.js
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/nsisFile.dll
-
Size
5KB
-
MD5
a35adabef191a1d5870096543ffc18ec
-
SHA1
76a77d50b8f0be5a77fdb7b71a661a356ead1b7f
-
SHA256
bb5be80416d8e381fbcb0f03ea3433d94a75786e3842e8cfe1b7b8bd57354457
-
SHA512
97eb8186abc0ae5a6c1858b78042c41fa377dea33ea0bae3c6957b7a22486ba0f1e0a4a43d817627bbba85d5de786c82e05d7505dc7df62bff51439fd0f8401c
-
SSDEEP
96:DBcvub8wwAwqr70/oGNh6e31JTLTNFh9552Qs:dcvm8wZw0L4h6e3PTLTB9552T
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2088 2248 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2248 2020 rundll32.exe 90 PID 2020 wrote to memory of 2248 2020 rundll32.exe 90 PID 2020 wrote to memory of 2248 2020 rundll32.exe 90
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsisFile.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsisFile.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2248 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2248 -s 6003⤵
- Program crash
PID:2088
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2248 -ip 22481⤵PID:2584
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4276,i,10065386245627775856,6567048529106473151,262144 --variations-seed-version --mojo-platform-channel-handle=4308 /prefetch:81⤵PID:2164