Overview
overview
7Static
static
7pkooit/WXDSRN.exe
windows7-x64
7pkooit/WXDSRN.exe
windows10-2004-x64
7pkooit/libcurl.dll
windows7-x64
7pkooit/libcurl.dll
windows10-2004-x64
7pkooit/libeay32.dll
windows7-x64
7pkooit/libeay32.dll
windows10-2004-x64
7pkooit/msvcp100.dll
windows7-x64
3pkooit/msvcp100.dll
windows10-2004-x64
3pkooit/msvcr100.dll
windows7-x64
3pkooit/msvcr100.dll
windows10-2004-x64
3pkooit/ssleay32.dll
windows7-x64
7pkooit/ssleay32.dll
windows10-2004-x64
7Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 06:12
Behavioral task
behavioral1
Sample
pkooit/WXDSRN.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
pkooit/WXDSRN.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
pkooit/libcurl.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
pkooit/libcurl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
pkooit/libeay32.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
pkooit/libeay32.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
pkooit/msvcp100.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
pkooit/msvcp100.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
pkooit/msvcr100.dll
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
pkooit/msvcr100.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
pkooit/ssleay32.dll
Resource
win7-20240708-en
General
-
Target
pkooit/msvcr100.dll
-
Size
752KB
-
MD5
67ec459e42d3081dd8fd34356f7cafc1
-
SHA1
1738050616169d5b17b5adac3ff0370b8c642734
-
SHA256
1221a09484964a6f38af5e34ee292b9afefccb3dc6e55435fd3aaf7c235d9067
-
SHA512
9ed1c106df217e0b4e4fbd1f4275486ceba1d8a225d6c7e47b854b0b5e6158135b81be926f51db0ad5c624f9bd1d09282332cf064680dc9f7d287073b9686d33
-
SSDEEP
12288:fQmCy3NeRjkpQmj3oaMtQqjoygfXq3kon9IlbgaOxQdVJJ6j5EBKX8hR5:ImCy3VQs9MtLjTgfa3kon9FaOdEz5
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 808 2724 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3320 wrote to memory of 2724 3320 rundll32.exe 83 PID 3320 wrote to memory of 2724 3320 rundll32.exe 83 PID 3320 wrote to memory of 2724 3320 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\pkooit\msvcr100.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\pkooit\msvcr100.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2724 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 6003⤵
- Program crash
PID:808
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2724 -ip 27241⤵PID:3044